Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12392 | The Correos Oficial WordPress plugin through 1.2.0.2 does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server. |
Mon, 10 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-10T18:17:19.090Z
Reserved: 2023-01-16T20:38:37.691Z
Link: CVE-2023-0331
Updated: 2024-08-02T05:10:55.121Z
Status : Modified
Published: 2023-02-27T16:15:11.967
Modified: 2025-03-10T19:15:37.300
Link: CVE-2023-0331
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD