Remote Code Execution and File Read Vulnerability in WordPress Plugin by Dynamics 365
CVE-2024-12583

9.9CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
4 January 2025

Summary

The Dynamics 365 Integration plugin for WordPress is compromised by a vulnerability that permits remote code execution and arbitrary file reading. This flaw, present in all versions up to and including 1.3.23, arises from inadequate input validation and sanitization within the render function that utilizes Twig templating. Authenticated attackers with Contributor-level access and above can potentially execute malicious code on the server, thereby compromising the integrity and security of the website.

Affected Version(s)

Dynamics 365 Integration * <= 1.3.23

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peter Thaleikis
.