First published: Mon Mar 27 2023(Updated: )
Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its “albums” module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)
Credit: disclosure@synopsys.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pluck CMS | <4.7.16 | |
Pluck CMS | =4.7.16-dev1 | |
Pluck CMS | =4.7.16-dev2 | |
Pluck CMS | =4.7.16-dev3 | |
Pluck CMS | =4.7.16-dev4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25828 is an authenticated remote code execution (RCE) vulnerability in Pluck CMS through its "albums" module.
CVE-2023-25828 affects Pluck CMS versions up to and including 4.7.16-dev4.
CVE-2023-25828 has a severity score of 7.2, indicating a high severity level.
CVE-2023-25828 is classified as CWE-434, which is an Unrestricted Upload of File with Dangerous Type vulnerability.
To fix CVE-2023-25828, users should update Pluck CMS to a version that is higher than 4.7.16-dev4.