The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Sep 2024 13:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Wed, 21 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wpml
Wpml wpml
CPEs cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpml
Wpml wpml
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 Aug 2024 20:45:00 +0000

Type Values Removed Values Added
Description The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Title WPML Multilingual CMS <= 4.6.12 - Authenticated(Contributor+) Remote Code Execution via Twig Server-Side Template Injection
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-21T20:36:58.048Z

Reserved: 2024-06-27T10:17:18.971Z

Link: CVE-2024-6386

cve-icon Vulnrichment

Updated: 2024-08-21T20:36:53.591Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-21T21:15:08.577

Modified: 2024-09-27T13:25:43.077

Link: CVE-2024-6386

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.