Vulnerability Description
The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to retrieve the contents of files like wp-config.php hosted on the system, perform a deserialization attack and possibly achieve remote code execution, and make requests to internal services.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gvectors | Wpforo Forum | <= 2.1.7 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wpforo/tags/2.1.7/classes/Actions.phpPatch
- https://plugins.trac.wordpress.org/browser/wpforo/tags/2.1.8/classes/Actions.phpPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/800fa098-b29f-4979-b7bThird Party Advisory
- https://plugins.trac.wordpress.org/browser/wpforo/tags/2.1.7/classes/Actions.phpPatch
- https://plugins.trac.wordpress.org/browser/wpforo/tags/2.1.8/classes/Actions.phpPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/800fa098-b29f-4979-b7bThird Party Advisory
FAQ
What is CVE-2023-2249?
CVE-2023-2249 is a vulnerability with a CVSS score of 8.8 (HIGH). The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure us...
How severe is CVE-2023-2249?
CVE-2023-2249 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2249?
Check the references section above for vendor advisories and patch information. Affected products include: Gvectors Wpforo Forum.