Jetpack < 12.1.1 - Author+ Arbitrary File Manipulation via API
CVE-2023-2996
8.8HIGH
Summary
The Jetpack plugin for WordPress, prior to version 12.1.1, suffers from a serious vulnerability where it fails to validate uploaded files. This lack of validation permits users with author roles or higher to manipulate existing files on the site. Consequently, this could lead to arbitrary file deletions and, in certain rare instances, even allow attackers to achieve remote code execution through phar deserialization. Website administrators should promptly update to mitigate potential security risks.
Affected Version(s)
Jetpack 1.9 < 2.0.9
Jetpack 2.1 < 2.1.7
Jetpack 2.2 < 2.2.10
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Miguel Neto
WPScan