
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2023-2359 vulnerability affects the Revolution Slider WordPress plugin versions 6.6.12 and below. The vulnerability was discovered by Marco Frison and publicly disclosed on May 22, 2023. This security issue involves an arbitrary file upload vulnerability that could lead to Remote Code Execution (RCE) in certain server configurations (WPScan).
The vulnerability stems from the plugin's failure to properly validate image files during import operations. The issue has been assigned a CVSS score of 6.6 (medium severity) and is classified under CWE-94. It falls into the OWASP Top 10 category A1: Injection. The vulnerability allows for arbitrary file upload which can be escalated to Remote Code Execution when specific server configurations are present (WPScan).
While the import functionality is typically restricted to administrators by default, the plugin can be configured to grant access to Editor and Author-level users as well. This means that in affected installations, authorized users with appropriate permissions could potentially execute arbitrary code on the server, leading to complete system compromise (WPScan).
The vulnerability has been patched in Revolution Slider version 6.6.13. Users are strongly advised to update to this version or later to protect their installations. If immediate updating is not possible, administrators should ensure that access to the import functionality is strictly limited to trusted administrators (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."