{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6140","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-11-14T22:50:43.564Z","datePublished":"2024-01-08T19:00:36.658Z","dateUpdated":"2024-09-04T15:36:41.937Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2024-01-08T19:00:36.658Z"},"title":"Essential Real Estate < 4.4 - Subscriber+ Arbitrary File Upload","problemTypes":[{"descriptions":[{"description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Essential Real Estate","versions":[{"status":"affected","versionType":"semver","version":"0","lessThan":"4.4.0"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Essential Real Estate WordPress plugin before 4.4.0 does not prevent users with limited privileges on the site, like subscribers, from momentarily uploading malicious PHP files disguised as ZIP archives, which may lead to remote code execution."}],"references":[{"url":"https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Marc Montpas","type":"finder"},{"lang":"en","value":"Krzysztof Zając (CERT PL)","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:21:17.679Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-03-13T19:50:21.336341Z","id":"CVE-2023-6140","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-04T15:36:41.937Z"}}]}}