First published: Wed Aug 09 2023(Updated: )
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Full Full - Customer | <=2.2.3 | |
<=2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4243 has been rated as a high severity vulnerability due to its potential for arbitrary file uploads.
To fix CVE-2023-4243, update the Full - Customer plugin to version 2.2.4 or later.
CVE-2023-4243 affects all versions of the Full - Customer plugin for WordPress up to and including 2.2.3.
CVE-2023-4243 is an arbitrary file upload vulnerability due to improper authorization in its REST API.
No, CVE-2023-4243 requires authenticated users with subscriber-level permissions or higher to exploit the vulnerability.