Description
An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2cvg-w29m-j8xc | Arbitrary Code Execution in Processwire |
References
History
Fri, 17 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-17T17:24:39.408Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24676
Updated: 2024-08-02T11:03:18.818Z
Status : Modified
Published: 2024-01-24T21:15:08.327
Modified: 2025-10-17T18:15:35.553
Link: CVE-2023-24676
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA