Remote Code Execution Vulnerability in wp-cleanfix Plugin by WordPress
CVE-2013-2109

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
10 February 2020

Summary

The wp-cleanfix plugin for WordPress is susceptible to a Remote Code Execution vulnerability that allows attackers to execute arbitrary code on affected servers. By exploiting this issue, an unauthorized user can gain control over the website, potentially leading to data breaches or further compromise. It is crucial for users of the plugin to update to the latest version immediately and implement best security practices to mitigate risks associated with this vulnerability.

Affected Version(s)

wp-cleanfix 1.4

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.