CVE-2023-6827

The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. This makes it possible for authenticated attackers with subscriber-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*

History

21 Dec 2023, 04:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time G5plus
G5plus essential Real Estate
CWE CWE-434
CPE cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb2ce22-077b-41dd-a2ff-cc1db9d20d38?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb2ce22-077b-41dd-a2ff-cc1db9d20d38?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset/3009780/essential-real-estate - () https://plugins.trac.wordpress.org/changeset/3009780/essential-real-estate - Patch
References () https://plugins.trac.wordpress.org/browser/essential-real-estate/tags/4.3.5/lib/smart-framework/core/fonts/fonts.class.php#L524 - () https://plugins.trac.wordpress.org/browser/essential-real-estate/tags/4.3.5/lib/smart-framework/core/fonts/fonts.class.php#L524 - Product

15 Dec 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-15 08:15

Updated : 2023-12-21 04:48


NVD link : CVE-2023-6827

Mitre link : CVE-2023-6827


JSON object : View

Products Affected

g5plus

  • essential_real_estate
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type