// For flags

CVE-2023-5886

WP All Export (Free < 1.4.1, Pro < 1.8.6) - Author+ PHAR Deserialization via CSRF

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers with the ability to upload files to make logged in users perform unwanted actions leading to PHAR deserialization, which may lead to remote code execution.

El complemento Export any WordPress data to XML/CSV de WordPress anterior a 1.4.0, el complemento WP All Export Pro de WordPress anterior a 1.8.6 no verifica los tokens nonce lo suficientemente temprano en el ciclo de vida de la solicitud, lo que permite a los atacantes con la capacidad de cargar archivos iniciar sesión los usuarios realizan acciones no deseadas que conducen a la deserialización de PHAR, lo que puede provocar la ejecución remota de código.

The Export any WordPress data to XML/CSV plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 1.4.1, and in versions up to 1.8.6 in the PRO version. This is due to missing nonce validation on a function. This makes it possible for unauthenticated attackers to perform unauthorized actions and deserialize a PHAR object and potentially achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

*Credits: WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-31 CVE Reserved
  • 2023-11-24 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-09-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Soflyy
Search vendor "Soflyy"
Export Any Wordpress Data To Xml\/csv
Search vendor "Soflyy" for product "Export Any Wordpress Data To Xml\/csv"
< 1.4.1
Search vendor "Soflyy" for product "Export Any Wordpress Data To Xml\/csv" and version " < 1.4.1"
wordpress
Affected
Soflyy
Search vendor "Soflyy"
Wp All Export
Search vendor "Soflyy" for product "Wp All Export"
< 1.8.6
Search vendor "Soflyy" for product "Wp All Export" and version " < 1.8.6"
pro, wordpress
Affected