A Server-Side Request Forgery (SSRF) in the installUpdateThemePluginAction function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the installThemePlugin parameter.
References
Link | Resource |
---|---|
https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md | Exploit Third Party Advisory |
https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md | Exploit Third Party Advisory |
Configurations
History
21 Jan 2025, 15:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wondercms:wondercms:3.1.3:*:*:*:*:*:*:* | |
First Time |
Wondercms wondercms
Wondercms |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | () https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md - Exploit, Third Party Advisory |
Information
Published : 2024-03-05 17:15
Updated : 2025-01-21 15:08
NVD link : CVE-2024-27561
Mitre link : CVE-2024-27561
CVE.ORG link : CVE-2024-27561
JSON object : View
Products Affected
wondercms
- wondercms
CWE
CWE-918
Server-Side Request Forgery (SSRF)