An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-01-24T00:00:00.000Z
Updated: 2025-10-17T17:24:39.408Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24676
Updated: 2024-08-02T11:03:18.818Z
Status : Modified
Published: 2024-01-24T21:15:08.327
Modified: 2025-10-17T18:15:35.553
Link: CVE-2023-24676
No data.