CVE-2023-0331
CVSS V2 None
CVSS V3 None
Description
The Correos Oficial WordPress plugin through 1.2.0.2 does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.
Overview
- CVE ID
- CVE-2023-0331
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-27T16:15:11
- Last Modified Date
- 2023-03-04T03:56:21
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:correos:correos_oficial:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.2.0.2 |
References
Reference URL | Reference Tags |
---|---|
https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0331 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0331 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 05:30:35 | Added to TrackCVE | |||
2023-04-17 05:30:38 | Weakness Enumeration | new |