CVE-2023-6271 – Backup Migration – Unauth Sensitive Data Exposure to Full Control of the site – POC/Exploit

CVE-2023-6271 – Backup Migration – Unauth Sensitive Data Exposure to Full Control of the site – POC/Exploit

A critical vulnerability has been identified in the Backup Migration plugin within the directory wordpress/wp-content/plugins/backup-backup/includes/htaccess/db_tables. This flaw not only discloses comprehensive information about the site, including its configuration, directories, and files, but, more critically, grants unauthorized access to sensitive data within the database, posing a significant security risk. Exploiting this vulnerability can lead to imminent threats, including potential brute force attacks on password hashes and the subsequent compromise of the entire system.

CVE-2023-6113 – WP Staging – Unauth Sensitive Data Exposure to Account Takeover – POC/Exploit

CVE-2023-6113 – WP Staging – Unauth Sensitive Data Exposure to Account Takeover – POC/Exploit

A critical vulnerability has been uncovered in the WP Staging plugin within the directory /wordpress/wp-content/uploads/wp-staging/cache. This vulnerability exposes comprehensive information about the site, including its configuration, directories, and files. More alarmingly, it allows unauthorized access to sensitive data within the

CVE-2023-5906 – Job Manager & Career – Directory listing to Sensitive Data Exposure – POC

CVE-2023-5906 – Job Manager & Career – Directory listing to Sensitive Data Exposure – POC

During testing, a critical vulnerability was discovered in the plugin, namely a vulnerability in the Directory Listings system, which allows an unauthorized user to view and download private files of other users. This vulnerability poses a serious security threat because it allows an attacker to gain access to confidential data and files of other users without their permission.

CVE-2023-5762 – Filr – Secure document library – RCE via file upload with phar ext – POC

CVE-2023-5762 – Filr – Secure document library – RCE via file upload with phar ext – POC

During the testing of the plugin, an RCE (Remote Code Execution) vulnerability was identified, which allows the operating system to execute commands and fully compromise the server on behalf of a user with Author-level privileges. This vulnerability is considered highly critical and poses a significant threat. It stems from the fact that the action=upload_file mechanism checks for files with a .php extension but fails to detect files with .phar or .phtml extensions. This oversight opens the door for an attacker to upload and execute malicious files with .phar or .phtml

CVE-2023-6065 – Quttera Web Malware Scanner < 3.4.2.1 - Directory Listing to Sensitive Data Exposure

CVE-2023-6065 – Quttera Web Malware Scanner < 3.4.2.1 - Directory Listing to Sensitive Data Exposure

During a comprehensive assessment of the Quttera Web Malware Scanner plugin, a significant vulnerability was identified. This flaw allows unauthorized access to detailed scan logs, revealing sensitive information such as local paths and portions of code. The discovery was made through a systematic examination of the plugin’s functionalities.

CVE-2023-6222 – Quttera Web Malware Scanner < 3.4.2.1 - Path Traversal - POC

CVE-2023-6222 – Quttera Web Malware Scanner < 3.4.2.1 -  Path Traversal - POC

During routine security testing of the Quttera Web Malware Scanner plugin, a critical vulnerability known as Path Traversal was identified. This flaw permits the unauthorized retrieval of files from locations outside the designated WordPress directory. The issue was discovered through a meticulous examination of the plugin’s functionalities.

CVE-2023-5105 – Frontend File Manager Plugin – Path Traversal to Full Control – POC

CVE-2023-5105 – Frontend File Manager Plugin – Path Traversal to Full Control – POC

In the process of rigorous testing, a critical vulnerability was unearthed in the Frontend File Manager Plugin, up to version affected, tagged with CVE-2023-5105. This vulnerability opens a path traversal avenue, allowing an attacker to download operating system files, including sensitive ones like wp-config.php. The severity lies in the potential compromise of the entire domain, especially alarming as this can be exploited by a user with Editor privileges.