First published: Tue Jun 18 2024(Updated: )
The Business Directory Plugin plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 6.4.3 via the class-csv-exporter.php file. This allows authenticated attackers, with author-level permissions and above, to embed untrusted input into CSV files exported by administrators, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Business Directory Plugin | <6.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5527 is rated as a moderate vulnerability due to the potential for authenticated attackers to exploit CSV Injection in the Business Directory Plugin.
To fix CVE-2023-5527, update the Business Directory Plugin to version 6.4.4 or higher.
CVE-2023-5527 affects users of the Business Directory Plugin for WordPress with versions up to 6.4.3.
The risks associated with CVE-2023-5527 include the possibility of attackers embedding malicious input into CSV files that can lead to data manipulation.
CVE-2023-5527 enables authenticated attackers to perform CSV Injection attacks, compromising the integrity of exported data.