{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5673","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-10-20T00:25:39.997Z","datePublished":"2023-12-26T18:33:03.911Z","dateUpdated":"2024-08-02T08:07:32.474Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-12-26T18:33:03.911Z"},"title":"WP Mail Log < 1.1.3 – Contributor+ Arbitrary File Upload to RCE","problemTypes":[{"descriptions":[{"description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"WP Mail Log","versions":[{"status":"affected","versionType":"semver","version":"0","lessThan":"1.1.3"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file extensions uploading files to attach to emails, allowing attackers to upload PHP files, leading to remote code execution."}],"references":[{"url":"https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"dc11","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:07:32.474Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]}}