The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
History

Wed, 21 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wpml
Wpml wpml
CPEs cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpml
Wpml wpml
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 Aug 2024 20:45:00 +0000

Type Values Removed Values Added
Description The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Title WPML Multilingual CMS <= 4.6.12 - Authenticated(Contributor+) Remote Code Execution via Twig Server-Side Template Injection
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-21T20:29:23.090Z

Updated: 2024-08-21T20:36:58.048Z

Reserved: 2024-06-27T10:17:18.971Z

Link: CVE-2024-6386

cve-icon Vulnrichment

Updated: 2024-08-21T20:36:53.591Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-21T21:15:08.577

Modified: 2024-08-22T12:48:02.790

Link: CVE-2024-6386

cve-icon Redhat

No data.