Local File Inclusion and Remote Code Execution in Media Library Assistant Plugin for WordPress
CVE-2023-4634
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 6 September 2023
Badges
Summary
The Media Library Assistant plugin for WordPress suffers from a vulnerability due to inadequate validation of file paths provided to the 'mla_stream_file' parameter. This issue exists in versions up to and including 3.09 and allows unauthenticated attackers to exploit the vulnerability by supplying crafted file paths via FTP. Successful exploitation can lead to serious consequences, including the ability to perform directory listings, local file inclusion, and even remote code execution, jeopardizing the security of impacted WordPress installations.
Affected Version(s)
Media Library Assistant * <= 3.09
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
44% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability Reserved