vulnerability
WordPress Plugin: review-widgets-for-foursquare: CVE-2023-48275: Unrestricted Upload of File with Dangerous Type
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:M/Au:M/C:C/I:C/A:C) | Nov 22, 2023 | May 15, 2025 | Apr 29, 2026 |
Severity
8
CVSS
(AV:N/AC:M/Au:M/C:C/I:C/A:C)
Published
Nov 22, 2023
Added
May 15, 2025
Modified
Apr 29, 2026
Description
Multiple plugins for WordPress by Trustindex.io are vulnerable to arbitrary file uploads due to missing file type validation in the ~/tabs/feature_request.php file in various versions. This makes it possible for authenticated attackers, with editor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This vulnerability may only be fully exploitable for RCE in unique scenarios where the server is overloaded and the unlink() is not triggered immediately following move_uploaded_file().
Solution
review-widgets-for-foursquare-plugin-cve-2023-48275
References
- https://www.cve.org/CVERecord?id=CVE-2023-48275
- https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-52342
- CVE-2023-48275
- https://attackerkb.com/topics/CVE-2023-48275
- CWE-434
- EUVD-EUVD-2023-52342
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.