AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected.



This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.










Project Subscriptions

Vendors Products
Acymailing Subscribe
Acymailing Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32369 AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
Fixes

Solution

update to a fixed version (>= 8.3.0)


Workaround

Prevent the execution of PHP files in the thumbnail directory to prevent the injected code from being executed

History

Tue, 11 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2025-02-11T20:11:00.208Z

Reserved: 2023-03-22T09:53:07.889Z

Link: CVE-2023-28731

cve-icon Vulnrichment

Updated: 2024-08-02T13:43:23.737Z

cve-icon NVD

Status : Modified

Published: 2023-03-30T12:15:07.573

Modified: 2024-11-21T07:55:53.507

Link: CVE-2023-28731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses