35 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

An issue discovered in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary php code via the hidden parameter to admin.php when editing a page. • https://github.com/pluck-cms/pluck/issues/80 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

File upload vulnerability in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary code and access sensitive information via the theme.php file. • https://github.com/pluck-cms/pluck/issues/85 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

File Upload vulnerability in PluckCMS v.4.7.10 allows a remote attacker to execute arbitrary code via the trashcan_restoreitem.php file. • https://github.com/pluck-cms/pluck/issues/86 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its “albums” module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. • https://www.synopsys.com/blogs/software-security/pluck-cms-vulnerability • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files. En el contexto de administración de Pluck versión 4.7.10-dev2, se presenta una vulnerabilidad de ejecución de comandos remota cuando se cargan archivos • https://cwe.mitre.org/data/definitions/434.html https://github.com/pluck-cms/pluck/issues/84 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •