CVE-2023-47621

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-47621
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47621.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-47621
Aliases
Related
Published
2023-11-13T20:15:28Z
Modified
2025-07-01T23:18:19.088824Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Guest Entries is a php library which allows users to create, update & delete entries from the front-end of a site. In affected versions the file uploads feature did not prevent the upload of PHP files. This may lead to code execution on the server by authenticated users. This vulnerability is fixed in v3.1.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/duncanmcclean/guest-entries

Affected ranges

Type
GIT
Repo
https://github.com/duncanmcclean/guest-entries
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2
v1.2.3

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.1
v2.1.2
v2.1.3

v3.*

v3.0.0
v3.1.0
v3.1.1