Vulnerability Details CVE-2023-5311
The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the contents of the .htaccess files located in a site's root directory or /wp-content and /wp-includes folders and achieve remote code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.066
EPSS Ranking 90.7%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-5311
-
cpe:2.3:a:wpvnteam:wp_extra:2.0
-
cpe:2.3:a:wpvnteam:wp_extra:2.1
-
cpe:2.3:a:wpvnteam:wp_extra:2.2
-
cpe:2.3:a:wpvnteam:wp_extra:3.0
-
cpe:2.3:a:wpvnteam:wp_extra:3.1
-
cpe:2.3:a:wpvnteam:wp_extra:3.2
-
cpe:2.3:a:wpvnteam:wp_extra:3.3
-
cpe:2.3:a:wpvnteam:wp_extra:3.4
-
cpe:2.3:a:wpvnteam:wp_extra:3.5
-
cpe:2.3:a:wpvnteam:wp_extra:3.6
-
cpe:2.3:a:wpvnteam:wp_extra:3.7
-
cpe:2.3:a:wpvnteam:wp_extra:3.8
-
cpe:2.3:a:wpvnteam:wp_extra:4.0
-
cpe:2.3:a:wpvnteam:wp_extra:4.1
-
cpe:2.3:a:wpvnteam:wp_extra:5.1
-
cpe:2.3:a:wpvnteam:wp_extra:5.2
-
cpe:2.3:a:wpvnteam:wp_extra:5.9
-
cpe:2.3:a:wpvnteam:wp_extra:6.0
-
cpe:2.3:a:wpvnteam:wp_extra:6.1
-
cpe:2.3:a:wpvnteam:wp_extra:6.2