The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.
History

Wed, 11 Sep 2024 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Thu, 05 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Bitapps
Bitapps file Manager
CPEs cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Bitapps
Bitapps file Manager
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Description The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the 'checkSyntax' function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.
Title Bit File Manager 6.0 - 6.5.5 - Unauthenticated Remote Code Execution via Race Condition
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-05T02:04:24.643Z

Updated: 2024-09-05T13:32:49.769Z

Reserved: 2024-08-08T19:42:34.617Z

Link: CVE-2024-7627

cve-icon Vulnrichment

Updated: 2024-09-05T13:31:27.320Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-05T03:15:03.560

Modified: 2024-09-11T16:31:21.893

Link: CVE-2024-7627

cve-icon Redhat

No data.