The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-362 |
Thu, 05 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitapps
Bitapps file Manager |
|
CPEs | cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Bitapps
Bitapps file Manager |
|
Metrics |
ssvc
|
Thu, 05 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions. | |
Title | Bit File Manager 6.0 - 6.5.5 - Unauthenticated Remote Code Execution via Race Condition | |
Weaknesses | CWE-94 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-05T02:04:24.643Z
Updated: 2024-09-05T13:32:49.769Z
Reserved: 2024-08-08T19:42:34.617Z
Link: CVE-2024-7627
Vulnrichment
Updated: 2024-09-05T13:31:27.320Z
NVD
Status : Analyzed
Published: 2024-09-05T03:15:03.560
Modified: 2024-09-11T16:31:21.893
Link: CVE-2024-7627
Redhat
No data.