Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wp2fac
Wp2fac wp2fac |
|
| Vendors & Products |
Wp2fac
Wp2fac wp2fac |
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wp2Fac 1.0 contains an OS command injection vulnerability in the send.php endpoint that allows remote attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'numara' parameter by appending shell commands with '&' operators to execute malicious code. | |
| Title | Wp2Fac 1.0 OS Command Injection via send.php Endpoint | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-15T21:48:12.337Z
Reserved: 2025-12-13T14:25:04.998Z
Link: CVE-2023-53872
Updated: 2025-12-15T21:41:14.550Z
Status : Awaiting Analysis
Published: 2025-12-15T21:15:49.680
Modified: 2025-12-16T14:10:11.300
Link: CVE-2023-53872
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:29Z