Vulnerability DatabaseGHSA-qxh3-jgvh-x55j

GHSA-qxh3-jgvh-x55j
PHP vulnerability analysis and mitigation

Overview

A privilege escalation vulnerability was identified in Connect-CMS (GHSA-qxh3-jgvh-x55j), discovered and published on July 3, 2023. The vulnerability affects Connect-CMS versions 1.7.1, 2.3.1 and earlier. This security issue was assigned a moderate severity rating with a CVSS score of 4.3 (GitHub Advisory).

Technical details

The vulnerability has been assessed with the following CVSS v3.1 metrics: Network attack vector, Low attack complexity, No privileges required, User interaction required, Unchanged scope, Low confidentiality impact, and No impact on integrity or availability. The complete CVSS string is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N (GitHub Advisory).

Impact

The vulnerability affects the management system of Connect-CMS, potentially allowing privilege escalation. The impact is primarily focused on confidentiality with a low severity rating, while there are no reported impacts on system integrity or availability (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Connect-CMS versions 1.7.2 and 2.3.2. Users are advised to upgrade to the latest version of Connect-CMS as the primary mitigation strategy (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management