CVE-2023-5199

The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the 'php-to-page' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code on the server. While subscribers may need to poison log files or otherwise get a file installed in order to achieve remote code execution, author and above users can upload files by default and achieve remote code execution easily.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php_to_page_project:php_to_page:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.9
References () https://plugins.trac.wordpress.org/browser/php-to-page/trunk/php-to-page.php?rev=441028#L22 - Exploit () https://plugins.trac.wordpress.org/browser/php-to-page/trunk/php-to-page.php?rev=441028#L22 - Exploit
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/83e5a0dc-fc51-4565-945f-190cf9175874?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/83e5a0dc-fc51-4565-945f-190cf9175874?source=cve - Third Party Advisory

Information

Published : 2023-10-30 14:15

Updated : 2024-11-21 08:41


NVD link : CVE-2023-5199

Mitre link : CVE-2023-5199

CVE.ORG link : CVE-2023-5199


JSON object : View

Products Affected

php_to_page_project

  • php_to_page
CWE
CWE-552

Files or Directories Accessible to External Parties