Jetpack < 12.1.1 - Author+ Arbitrary File Manipulation via API
CVE-2023-2996

8.8HIGH

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
27 June 2023

Summary

The Jetpack plugin for WordPress, prior to version 12.1.1, suffers from a serious vulnerability where it fails to validate uploaded files. This lack of validation permits users with author roles or higher to manipulate existing files on the site. Consequently, this could lead to arbitrary file deletions and, in certain rare instances, even allow attackers to achieve remote code execution through phar deserialization. Website administrators should promptly update to mitigate potential security risks.

Affected Version(s)

Jetpack 1.9 < 2.0.9

Jetpack 2.1 < 2.1.7

Jetpack 2.2 < 2.2.10

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Miguel Neto
WPScan
.