Vulnerability Details : CVE-2023-4591
A local file inclusion vulnerability has been found in WPN-XM Serverstack affecting version 0.8.6, which would allow an unauthenticated user to perform a local file inclusion (LFI) via the /tools/webinterface/index.php?page parameter by sending a GET request. This vulnerability could lead to the loading of a PHP file on the server, leading to a critical webshell exploit.
Published
2023-11-03 12:15:09
Updated
2023-11-13 18:31:39
Vulnerability category: File inclusion
Products affected by CVE-2023-4591
- cpe:2.3:a:wpn-xm:wpn-xm:0.8.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-4591
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-4591
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
Spanish National Cybersecurity Institute, S.A. (INCIBE) | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-4591
-
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.Assigned by: cve-coordination@incibe.es (Primary)
References for CVE-2023-4591
-
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wpn-xm-serverstack
Multiple vulnerabilities in WPN-XM Serverstack | INCIBE-CERT | INCIBEThird Party Advisory
Jump to