This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
No analysis available yet.
Vendor Solution
update to a fixed version (>= 8.3.0)
Vendor Workaround
Prevent the execution of PHP files in the thumbnail directory to prevent the injected code from being executed
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32369 | AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0. |
Tue, 11 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2025-02-11T20:11:00.208Z
Reserved: 2023-03-22T09:53:07.889Z
Link: CVE-2023-28731
Updated: 2024-08-02T13:43:23.737Z
Status : Modified
Published: 2023-03-30T12:15:07.573
Modified: 2024-11-21T07:55:53.507
Link: CVE-2023-28731
No data.
OpenCVE Enrichment
No data.
EUVD