A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/pluxml/PluXml/issues/829 |
|
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 30 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pluxml
Pluxml pluxml |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pluxml
Pluxml pluxml |
|
| Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-29T00:00:00
Updated: 2024-10-30T14:38:55.614Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48138
Updated: 2024-10-30T14:38:39.991Z
Status : Awaiting Analysis
Published: 2024-10-29T22:15:03.810
Modified: 2024-11-01T12:57:35.843
Link: CVE-2024-48138
No data.