CVE-2023-0159

Scores

EPSS

0.927high92.7%
0%20%40%60%80%100%

Percentile: 92.7%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Description

The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

Related Vulnerabilities

Exploits

Exploit ID: 52085

Source: exploitdb

URL: https://www.exploit-db.com/exploits/52085

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: extensive_vc_addons_for_wpbakery_page_builder

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:wprealize:extensive_vc_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",      "versionEndExcluding": "1.9.1",      "vulnerable": true ...

Source: nvd

End of list