The Dynamics 365 Integration plugin for WordPress is vulnerable to Remote Code Execution and Arbitrary File Read in all versions up to, and including, 1.3.23 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 04 Jan 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Dynamics 365 Integration plugin for WordPress is vulnerable to Remote Code Execution and Arbitrary File Read in all versions up to, and including, 1.3.23 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. | |
Title | Dynamics 365 Integration <= 1.3.23 - Authenticated (Contributor+) Remote Code Execution and Arbitrary File Read via Twig Server-Side Template Injection | |
Weaknesses | CWE-1336 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-04T08:22:51.633Z
Updated: 2025-01-06T16:34:41.066Z
Reserved: 2024-12-12T17:26:16.839Z
Link: CVE-2024-12583
Vulnrichment
Updated: 2025-01-06T16:18:48.276Z
NVD
Status : Received
Published: 2025-01-04T09:15:06.090
Modified: 2025-01-04T09:15:06.090
Link: CVE-2024-12583
Redhat
No data.