Vulnerability Allows Authenticated Attackers to Execute Arbitrary PHP Code on Server
CVE-2024-5456
8.8HIGH
Summary
The vulnerability in the Panda Video plugin for WordPress enables Local File Inclusion through the 'selected_button' parameter. Authenticated users with Contributor-level access and above can exploit this flaw to include and execute arbitrary files on the server. This opens up pathways for bypassing access controls, exfiltrating sensitive data, and executing malicious PHP code. Given the implications, it is essential for organizations utilizing this plugin to apply necessary mitigations and ensure their installations are on versions that are not affected.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published