The User Post Gallery - UPG plugin for WordPress is vulnerable to authorization bypass which leads to remote command execution due to the use of a nopriv AJAX action and user supplied function calls and parameters in versions up to, and including 2.19. This makes it possible for unauthenticated attackers to call arbitrary PHP functions and perform actions like adding new files that can be webshells and updating the site's options to allow anyone to register as an administrator.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/wp-upg/trunk/wp-upg.php#L723 | Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/7c0d7743-14f5-4fdd-a67b-b1f95dbe0f46 | Broken Link Third Party Advisory |
Configurations
Information
Published : 2023-01-03 07:15
Updated : 2023-01-10 05:50
NVD link : CVE-2023-0039
Mitre link : CVE-2023-0039
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
odude
- user_post_gallery