The Favicon Generator (CLOSED) WordPress plugin before 2.1 does not validate files to be uploaded and does not have CSRF checks, which could allow attackers to make logged in admin upload arbitrary files such as PHP on the server
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/5e814b02-3870-4742-905d-ec03b0d31add/ | Exploit Third Party Advisory |
Configurations
History
27 Sep 2024, 21:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/5e814b02-3870-4742-905d-ec03b0d31add/ - Exploit, Third Party Advisory | |
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
CPE | cpe:2.3:a:pixeljar:favicon_generator:*:*:*:*:*:wordpress:*:* | |
First Time |
Pixeljar favicon Generator
Pixeljar |
13 Sep 2024, 15:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
13 Sep 2024, 14:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-13 06:15
Updated : 2024-09-27 21:27
NVD link : CVE-2024-7863
Mitre link : CVE-2024-7863
CVE.ORG link : CVE-2024-7863
JSON object : View
Products Affected
pixeljar
- favicon_generator
CWE
CWE-352
Cross-Site Request Forgery (CSRF)