Lucene search

K
cveWPScanCVE-2023-4314
HistorySep 11, 2023 - 8:15 p.m.

CVE-2023-4314

2023-09-1120:15:12
WPScan
web.nvd.nist.gov
20
cve-2023-4314
wordpress plugin
vulnerability
data serialization
remote code execution
admin privilege
nvd

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.1%

The wpDataTables WordPress plugin before 2.1.66 does not validate the “Serialized PHP array” input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite.

Affected configurations

Nvd
Vulners
Node
tms-outsourcewpdatatablesRange<2.1.66wordpress
VendorProductVersionCPE
tms-outsourcewpdatatables*cpe:2.3:a:tms-outsource:wpdatatables:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "wpDataTables",
    "versions": [
      {
        "status": "affected",
        "versionType": "custom",
        "version": "0",
        "lessThan": "2.1.66"
      }
    ],
    "defaultStatus": "unaffected",
    "collectionURL": "https://wordpress.org/plugins"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.1%

Related for CVE-2023-4314