CVE-2023-4243

HIGH EXPLOITED

FULL - Customer <2.2.3 - RCE

Title source: llm
STIX 2.1

Description

The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.

Scores

CVSS v3 8.8
EPSS 0.0096
EPSS Percentile 76.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

VulnCheck KEV 2023-08-08
CWE
CWE-285 CWE-434
Status published
Products (2)
full/full_-_customer < 2.2.3
fullservices/FULL – Cliente < 2.2.3
Published Aug 09, 2023
Tracked Since Feb 18, 2026