First published: Fri Oct 27 2023(Updated: )
A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.304 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5812 is high, with a severity value of 8.8.
The vulnerability allows for unrestricted upload by manipulating the 'uploaded_file' argument in the function handleFileUpload of the file core/tools/upload.php.
Yes, the vulnerability can be exploited remotely.
It is recommended to upgrade to a version of flusity CMS that is not affected by this vulnerability, such as version 2.304 or later.
The Common Weakness Enumeration (CWE) ID for CVE-2023-5812 is CWE-434.