CVE-2023-31689

In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.
References
Link Resource
https://github.com/vedees/wcms/issues/15 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*

History

27 May 2023, 02:12

Type Values Removed Values Added
References (MISC) https://github.com/vedees/wcms/issues/15 - (MISC) https://github.com/vedees/wcms/issues/15 - Exploit, Issue Tracking
CPE cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*
First Time Wcms wcms
Wcms
CWE CWE-434
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

22 May 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-22 20:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-31689

Mitre link : CVE-2023-31689

CVE.ORG link : CVE-2023-31689


JSON object : View

Products Affected

wcms

  • wcms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type