Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-36220
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-07 Aug, 2023 | 14:15
Updated At-09 Aug, 2023 | 17:55

Directory Traversal vulnerability in Textpattern CMS v4.8.8 allows a remote authenticated attacker to execute arbitrary code and gain access to sensitive information via the plugin Upload function.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

textpattern
textpattern
>>textpattern>>4.8.8
cpe:2.3:a:textpattern:textpattern:4.8.8:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
https://release-demo.textpattern.co/cve@mitre.org
Product
https://textpattern.com/cve@mitre.org
Product
https://textpattern.com/file_download/118/textpattern-4.8.8.zipcve@mitre.org
Release Notes
Change History
0Changes found

Details not found