4.8
CVSSv3

CVE-2023-4636

Published: 05/09/2023 Updated: 07/11/2023
CVSS v3 Base Score: 4.8 | Impact Score: 2.7 | Exploitability Score: 1.7
VMScore: 0

Vulnerability Summary

The WordPress File Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Vulnerable Product Search on Vulmon Subscribe to Product

userprivatefiles wordpress file sharing plugin

Github Repositories

Unauthenticated Remote Code Execution with default Imagick

CVE-2023-4636 The vulnerability in the limelight is an unauthenticated remote code execution (RCE) issue stemming from insufficient controls on file paths occurring during image processing via Imagick It enables adversaries to supply files via FTP, leading to local file inclusion and remote code execution Under these conditions, an attacker could potentially take over any un