The Code Explorer plugin for WordPress is vulnerable to arbitrary external file reading in all versions up to, and including, 1.4.5. This is due to the fact that the plugin does not restrict accessing files to those outside of the WordPress instance, though the intention of the plugin is to only access WordPress related files. This makes it possible for authenticated attackers, with administrator-level access, to read files outside of the WordPress instance.
History

Wed, 06 Nov 2024 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Bowo
Bowo code Explorer
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:bowo:code_explorer:*:*:*:*:*:wordpress:*:*
Vendors & Products Bowo
Bowo code Explorer

Wed, 30 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
Description The Code Explorer plugin for WordPress is vulnerable to arbitrary external file reading in all versions up to, and including, 1.4.5. This is due to the fact that the plugin does not restrict accessing files to those outside of the WordPress instance, though the intention of the plugin is to only access WordPress related files. This makes it possible for authenticated attackers, with administrator-level access, to read files outside of the WordPress instance.
Title Code Explorer <= 1.4.5 - Authenticated (Admin+) External File Reading
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-30T02:04:35.541Z

Updated: 2024-10-30T14:59:31.112Z

Reserved: 2023-10-26T22:28:52.027Z

Link: CVE-2023-5816

cve-icon Vulnrichment

Updated: 2024-10-30T13:43:36.129Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-30T03:15:03.090

Modified: 2024-11-06T23:07:36.970

Link: CVE-2023-5816

cve-icon Redhat

No data.