The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the 'php-to-page' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code on the server. While subscribers may need to poison log files or otherwise get a file installed in order to achieve remote code execution, author and above users can upload files by default and achieve remote code execution easily.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-05T18:55:34.325Z

Reserved: 2023-09-26T12:44:15.027Z

Link: CVE-2023-5199

cve-icon Vulnrichment

Updated: 2024-08-02T07:52:07.765Z

cve-icon NVD

Status : Modified

Published: 2023-10-30T14:15:09.307

Modified: 2024-11-21T08:41:17.220

Link: CVE-2023-5199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.