NA

CVE-2023-2877

Published: 27/06/2023 Updated: 07/11/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The Formidable Forms WordPress plugin prior to 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

strategy11 formidable forms

Vendor Advisories

Check Point Reference: CPAI-2023-1654 Date Published: 30 Apr 2024 Severity: High ...

Github Repositories

Formidable Forms < 6.3.1 - Subscriber+ Remote Code Execution

CVE-2023-2877 Formidable Forms &lt; 631 - Subscriber+ Remote Code Execution Usage usage: CVE-2023-2877py [-h] -w URL -u USERNAME -p PASSWORD [-pl PLUGIN] [-c CMD] CVE-2023-2877 - Formidable Forms &lt; 631 - Subscriber+ Remote Code Execution Script options: -h, --help show this help message and exit -w URL, --url URL WordPress site URL -u USER