{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7201","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2024-01-02T22:54:43.113Z","datePublished":"2024-04-15T05:00:01.572Z","dateUpdated":"2024-08-09T20:01:33.240Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2024-04-15T05:00:01.572Z"},"title":"Everest Backup < 2.2.5 - Admin+ Arbitrary File Upload","problemTypes":[{"descriptions":[{"description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Everest Backup ","versions":[{"status":"affected","versionType":"semver","version":"0","lessThan":"2.2.5"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Everest Backup  WordPress plugin before 2.2.5 does not properly validate backup files to be uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)"}],"references":[{"url":"https://wpscan.com/vulnerability/64ba4461-bbba-45eb-981f-bb5f2e5e56e1/","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Emad","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:57:34.095Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/64ba4461-bbba-45eb-981f-bb5f2e5e56e1/","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"affected":[{"vendor":"everestthemes","product":"everest_backup","cpes":["cpe:2.3:a:everestthemes:everest_backup:*:*:*:*:*:wordpress:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"2.2.5","versionType":"semver"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-04-15T16:44:40.233593Z","id":"CVE-2023-7201","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-09T20:01:33.240Z"}}]}}