Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-rw82-mhmx-grmj: Guest Entries Remote code execution via file uploads

Impact

When using the file uploads feature, it was possible to upload PHP files.

Patches

The vulnerability is fixed in v3.1.2.

ghsa
#vulnerability#web#git#php#rce

Skip to content

Sign up

CVE-2023-47621

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

Explore

*   All features
*   Documentation
*   GitHub Skills
*   Blog
  • For

    • Enterprise
    • Teams
    • Startups
    • Education

    By Solution

    • CI/CD & Automation
    • DevOps
    • DevSecOps

    Resources

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

Repositories

*   Topics
*   Trending
*   Collections
  • Pricing

Search code, repositories, users, issues, pull requests…

Provide feedback

We read every piece of feedback, and take your input very seriously.

Include my email address so I can be contacted

Saved searches****Use saved searches to filter your results more quickly

Sign in

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-47621

Guest Entries Remote code execution via file uploads

High severity GitHub Reviewed Published Nov 11, 2023 in duncanmcclean/guest-entries • Updated Nov 14, 2023

Vulnerability details Dependabot alerts 0

Package

composer doublethreedigital/guest-entries (Composer)

Affected versions

< 3.1.2

Patched versions

3.1.2

composer duncanmcclean/guest-entries (Composer)

< 3.1.2

3.1.2

Description

Impact

When using the file uploads feature, it was possible to upload PHP files.

Patches

The vulnerability is fixed in v3.1.2.

References

  • GHSA-rw82-mhmx-grmj
  • https://nvd.nist.gov/vuln/detail/CVE-2023-47621
  • duncanmcclean/guest-entries@a8e17b4

duncanmcclean published to duncanmcclean/guest-entries

Nov 11, 2023

Published by the National Vulnerability Database

Nov 13, 2023

Published to the GitHub Advisory Database

Nov 14, 2023

Reviewed

Nov 14, 2023

Last updated

Nov 14, 2023

Severity

High

8.8

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

Low

User interaction

None

Scope

Unchanged

Confidentiality

High

Integrity

High

Availability

High

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CWE-434

CVE ID

CVE-2023-47621

GHSA ID

GHSA-rw82-mhmx-grmj

Source code

duncanmcclean/guest-entries

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2023-47621: Remote code execution via file uploads

Guest Entries is a php library which allows users to create, update & delete entries from the front-end of a site. In affected versions the file uploads feature did not prevent the upload of PHP files. This may lead to code execution on the server by authenticated users. This vulnerability is fixed in v3.1.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.