A Server-Side Request Forgery (SSRF) in the getFileFromRepo function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter.
References
Link | Resource |
---|---|
https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md | Exploit Third Party Advisory |
https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md | Exploit Third Party Advisory |
Configurations
History
21 Jan 2025, 15:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:wondercms:wondercms:3.1.3:*:*:*:*:*:*:* | |
First Time |
Wondercms wondercms
Wondercms |
Information
Published : 2024-03-05 17:15
Updated : 2025-01-21 15:08
NVD link : CVE-2024-27563
Mitre link : CVE-2024-27563
CVE.ORG link : CVE-2024-27563
JSON object : View
Products Affected
wondercms
- wondercms
CWE
CWE-918
Server-Side Request Forgery (SSRF)