Lucene search

K
nvd[email protected]NVD:CVE-2024-7627
HistorySep 05, 2024 - 3:15 a.m.

CVE-2024-7627

2024-09-0503:15:03
CWE-94
CWE-362
web.nvd.nist.gov
bit file manager
wordpress
remote code execution
vulnerability
checksyntax
temporary file
publicly accessible directory
unauthenticated attackers
administrator
guest user permissions
cve-2024-7627

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

23.6%

The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the ‘checkSyntax’ function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.

Affected configurations

Nvd
Node
bitappsfile_managerRange6.06.5.6wordpress
VendorProductVersionCPE
bitappsfile_manager*cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

23.6%

Related for NVD:CVE-2024-7627