An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
GHSA-2cvg-w29m-j8xc | Arbitrary Code Execution in Processwire |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 17 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-17T17:24:39.408Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24676

Updated: 2024-08-02T11:03:18.818Z

Status : Modified
Published: 2024-01-24T21:15:08.327
Modified: 2025-10-17T18:15:35.553
Link: CVE-2023-24676

No data.

No data.