CVE-2023-0331

The Correos Oficial WordPress plugin through 1.2.0.2 does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:correos:correos_oficial:*:*:*:*:*:wordpress:*:*

History

07 Nov 2023, 04:00

Type Values Removed Values Added
CWE CWE-552

04 Mar 2023, 03:56

Type Values Removed Values Added
CPE cpe:2.3:a:correos:correos_oficial:*:*:*:*:*:wordpress:*:*
First Time Correos correos Oficial
Correos
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b - (MISC) https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b - Exploit, Third Party Advisory

27 Feb 2023, 16:23

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-27 16:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-0331

Mitre link : CVE-2023-0331

CVE.ORG link : CVE-2023-0331


JSON object : View

Products Affected

correos

  • correos_oficial
CWE

No CWE.