Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. doublethreedigital/guest-entries
  4. ›
  5. CVE-2023-47621

CVE-2023-47621: Guest Entries Remote code execution via file uploads

November 14, 2023 (updated November 15, 2023)

Guest Entries is a php library which allows users to create, update & delete entries from the front-end of a site. In affected versions the file uploads feature does not prevent the upload of PHP files. This may lead to code execution on the server by authenticated users. This vulnerability is fixed in v3.1.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

  • github.com/advisories/GHSA-rw82-mhmx-grmj
  • github.com/duncanmcclean/guest-entries/commit/a8e17b4413bfbbc337a887761a6c858ef1ddb4da
  • github.com/duncanmcclean/guest-entries/security/advisories/GHSA-rw82-mhmx-grmj
  • nvd.nist.gov/vuln/detail/CVE-2023-47621

Code Behaviors & Features

Detect and mitigate CVE-2023-47621 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.1.2

Fixed versions

  • 3.1.2

Solution

Upgrade to version 3.1.2 or above.

Source file

packagist/doublethreedigital/guest-entries/CVE-2023-47621.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:33 +0000.