{ "schema_version": "1.4.0", "id": "GHSA-xw74-8r5v-3xpv", "modified": "2022-05-24T17:48:01Z", "published": "2022-05-24T17:48:01Z", "aliases": [ "CVE-2020-35314" ], "details": "An OS command injection vulnerability in the installUpdateThemePluginAction function in index.php in WonderCMS 3.1.3, allows remote attackers to upload a custom plugin which can contain arbitrary code and obtain a webshell via the theme/plugin installer.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35314" }, { "type": "WEB", "url": "https://github.com/robiso/wondercms" }, { "type": "WEB", "url": "https://packetstormsecurity.com/files/160311/WonderCMS-3.1.3-Remote-Code-Execution.html" }, { "type": "WEB", "url": "https://zetc0de.github.io/post/authenticated-rce-ssrf-wondercms" }, { "type": "WEB", "url": "https://zetc0de.github.io/post/authenticated-rce-ssrf-wondercms/#authenticated-remote-code-execution" } ], "database_specific": { "cwe_ids": [ "CWE-78" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-04-20T20:15:00Z" } }