The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
History

Fri, 06 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared News Element Elementor Blog Magazine
News Element Elementor Blog Magazine wordpress Plugin
CPEs cpe:2.3:a:news_element_elementor_blog_magazine:wordpress_plugin:*:*:*:*:*:*:*:*
Vendors & Products News Element Elementor Blog Magazine
News Element Elementor Blog Magazine wordpress Plugin
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 Aug 2024 06:15:00 +0000

Type Values Removed Values Added
Description The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
Title News Element Elementor Blog Magazine < 1.0.6 - Unauthenticated LFI
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-08-17T06:00:02.718Z

Updated: 2024-09-13T14:04:34.741Z

Reserved: 2024-07-02T20:04:52.620Z

Link: CVE-2024-6459

cve-icon Vulnrichment

Updated: 2024-08-19T18:18:54.678Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-17T06:15:03.973

Modified: 2024-09-06T17:35:18.880

Link: CVE-2024-6459

cve-icon Redhat

No data.