A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/pluxml/PluXml/issues/829 |
History
Wed, 30 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pluxml
Pluxml pluxml |
|
Weaknesses | CWE-94 | |
CPEs | cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:* | |
Vendors & Products |
Pluxml
Pluxml pluxml |
|
Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-29T00:00:00
Updated: 2024-10-30T14:38:55.614Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48138
Vulnrichment
Updated: 2024-10-30T14:38:39.991Z
NVD
Status : Awaiting Analysis
Published: 2024-10-29T22:15:03.810
Modified: 2024-11-01T12:57:35.843
Link: CVE-2024-48138
Redhat
No data.