// For flags

CVE-2008-6811

Instinct WP e-Commerce <= 3.4 - Arbitrary File Upload

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unrestricted file upload vulnerability in image_processing.php in the e-Commerce Plugin 3.4 and earlier for Wordpress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/plugins/wp-shopping-cart/.

Vulnerabilidad de carga de archivos sin restricciones en image_processing.php en e-Commerce Plugin v3.4 y anteriores para Wordpress, permite a atacantes remotos ejecutar código de su elección subiendo un fichero con extensión ejecutable, y luego accediendo a él mediante una petición directa al fichero en wp-content/plugins/wp-shopping-cart/.

*Credits: t0pP8uZz
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-10-29 CVE Published
  • 2009-05-17 CVE Reserved
  • 2023-08-20 EPSS Updated
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Instinct
Search vendor "Instinct"
E-commerce Plugin
Search vendor "Instinct" for product "E-commerce Plugin"
<= 3.4
Search vendor "Instinct" for product "E-commerce Plugin" and version " <= 3.4"
-
Affected
in Wordpress
Search vendor "Wordpress"
Wordpress
Search vendor "Wordpress" for product "Wordpress"
*-
Safe