CVE-2023-36220

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-36220
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36220.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-36220
Published
2023-08-07T14:15:11Z
Modified
2025-01-14T11:48:01.198094Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Directory Traversal vulnerability in Textpattern CMS v4.8.8 allows a remote authenticated attacker to execute arbitrary code and gain access to sensitive information via the plugin Upload function.

References

Affected packages

Git / github.com/textpattern/textpattern

Affected ranges

Type
GIT
Repo
https://github.com/textpattern/textpattern
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

4.*

4.2.0
4.3.0
4.4.0
4.4.1
4.5.0
4.5.1
4.5.2
4.6.0
4.6.0-beta
4.6.0-beta.2
4.6.0-beta.3
4.6.1
4.6.2
4.7.0
4.7.0-beta
4.7.0-beta.2
4.7.0-beta.3
4.7.0-rc.1
4.7.1
4.7.2
4.7.3
4.8.0
4.8.0-beta
4.8.0-beta.2
4.8.0-beta.3
4.8.1
4.8.2
4.8.3
4.8.4
4.8.5
4.8.6
4.8.7
4.8.8
4.8.8-beta.1