No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wp2fac
Wp2fac wp2fac |
|
| Vendors & Products |
Wp2fac
Wp2fac wp2fac |
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wp2Fac 1.0 contains an OS command injection vulnerability in the send.php endpoint that allows remote attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'numara' parameter by appending shell commands with '&' operators to execute malicious code. | |
| Title | Wp2Fac 1.0 OS Command Injection via send.php Endpoint | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:06:58.800Z
Reserved: 2025-12-13T14:25:04.998Z
Link: CVE-2023-53872
Updated: 2025-12-15T21:41:14.550Z
Status : Deferred
Published: 2025-12-15T21:15:49.680
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-53872
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:29Z