CVE-2023-1381
Summary
| CVE | CVE-2023-1381 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-10 15:15:00 UTC |
| Updated | 2023-11-07 04:03:00 UTC |
| Description | The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Uncovering a PHAR Deserialization Vulnerability in WP Meta SEO and Escalating to RCE - WPScan WordPress Security |
MISC |
blog.wpscan.com |
Exploit, Third Party Advisory |
| WP Meta SEO < 4.5.5 - Author+ PHAR Deserialization WordPress Security Vulnerability |
MISC |
wpscan.com |
Exploit, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.