ghsa-99x8-72mf-94fx
Vulnerability from github
Published
2024-09-05 03:31
Modified
2024-09-05 03:31
Severity
Details
The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.
{ "affected": [], "aliases": [ "CVE-2024-7627" ], "database_specific": { "cwe_ids": [ "CWE-362", "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-05T03:15:03Z", "severity": "HIGH" }, "details": "The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the \u0027checkSyntax\u0027 function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.", "id": "GHSA-99x8-72mf-94fx", "modified": "2024-09-05T03:31:24Z", "published": "2024-09-05T03:31:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7627" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/browser/file-manager/trunk/backend/app/Providers/FileEditValidator.php#L39" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/browser/file-manager/trunk/backend/app/Providers/FileEditValidator.php#L88" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/changeset/3138710" }, { "type": "WEB", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f29de7a-3f15-4b6d-aad7-6a08151e2113?source=cve" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading...