Refine your search
1 vulnerability found for MW WP Form by Web Consultation Office Co., Ltd
jvndb-2023-012042
Vulnerability from jvndb
Published
2023-12-15 15:17
Modified
2024-03-26 17:39
Severity ?
Summary
WordPress plugin "MW WP Form" vulnerable to arbitrary file upload
Details
WordPress plugin "MW WP Form" provided by Web Consultation Office Co., Ltd can create a mail form using shortcode. MW WP Form contains a vulnerability that may allow an attacker to upload arbitrary files (CVE-2023-6316, CWE-434).
References
| Type | URL | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-012042.html",
"dc:date": "2024-03-26T17:39+09:00",
"dcterms:issued": "2023-12-15T15:17+09:00",
"dcterms:modified": "2024-03-26T17:39+09:00",
"description": "WordPress plugin \"MW WP Form\" provided by Web Consultation Office Co., Ltd can create a mail form using shortcode. MW WP Form contains a vulnerability that may allow an attacker to upload arbitrary files (CVE-2023-6316, CWE-434).",
"link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-012042.html",
"sec:cpe": {
"#text": "cpe:/a:mw_wp_form_project:mw_wp_form",
"@product": "MW WP Form",
"@vendor": "Web Consultation Office Co., Ltd",
"@version": "2.2"
},
"sec:cvss": {
"@score": "9.8",
"@severity": "Critical",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2023-012042",
"sec:references": [
{
"#text": "https://jvn.jp/en/vu/JVNVU97876221/index.html",
"@id": "JVNVU#97876221",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-6316",
"@id": "CVE-2023-6316",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-6316",
"@id": "CVE-2023-6316",
"@source": "NVD"
},
{
"#text": "https://www.wordfence.com/blog/2023/12/update-asap-critical-unauthenticated-arbitrary-file-upload-in-mw-wp-form-allows-malicious-code-execution/",
"@id": "Update ASAP! Critical Unauthenticated Arbitrary File Upload in MW WP Form Allows Malicious Code Execution",
"@source": "Related Information"
},
{
"#text": "https://cwe.mitre.org/data/definitions/434.html",
"@id": "CWE-434",
"@title": "Unrestricted Upload of File with Dangerous Type(CWE-434)"
}
],
"title": "WordPress plugin \"MW WP Form\" vulnerable to arbitrary file upload"
}