{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5762","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-10-25T03:27:18.484Z","datePublished":"2023-12-04T21:28:22.256Z","dateUpdated":"2024-08-02T08:07:32.666Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-12-04T21:28:22.256Z"},"title":"Filr – Secure document library < 1.2.3.6 - Author+ RCE via file upload with phar ext","problemTypes":[{"descriptions":[{"description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Filr","versions":[{"status":"affected","versionType":"semver","version":"0","lessThan":"1.2.3.6"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Filr WordPress plugin before 1.2.3.6 is vulnerable from an RCE (Remote Code Execution) vulnerability, which allows the operating system to execute commands and fully compromise the server on behalf of a user with Author-level privileges."}],"references":[{"url":"https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Dmtirii Ignatyev","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:07:32.666Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]}}