Wp2Fac 1.0 contains an OS command injection vulnerability in the send.php endpoint that allows remote attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'numara' parameter by appending shell commands with '&' operators to execute malicious code.
Metrics
Affected Vendors & Products
References
History
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wp2fac
Wp2fac wp2fac |
|
| Vendors & Products |
Wp2fac
Wp2fac wp2fac |
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wp2Fac 1.0 contains an OS command injection vulnerability in the send.php endpoint that allows remote attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'numara' parameter by appending shell commands with '&' operators to execute malicious code. | |
| Title | Wp2Fac 1.0 OS Command Injection via send.php Endpoint | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-15T21:48:12.337Z
Reserved: 2025-12-13T14:25:04.998Z
Link: CVE-2023-53872
Updated: 2025-12-15T21:41:14.550Z
Status : Awaiting Analysis
Published: 2025-12-15T21:15:49.680
Modified: 2025-12-16T14:10:11.300
Link: CVE-2023-53872
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:29Z