The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
References
Configurations
History
No history.
Information
Published : 2023-08-09 04:15
Updated : 2023-11-07 04:22
NVD link : CVE-2023-4243
Mitre link : CVE-2023-4243
CVE.ORG link : CVE-2023-4243
JSON object : View
Products Affected
full
- full_-_customer
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type