CVE-2023-24676: Arbitrary Code Execution in Processwire
7.2
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| processwire/processwire | composer | <= 3.0.210 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on unvalidated use of the 'download_zip_url' parameter during module installation. The attack flow involves (1) supplying a malicious URL via this parameter, (2) downloading/extracting the ZIP, and (3) executing contained PHP code. ProcessWire's module installation logic would require functions to handle remote downloads (e.g., downloadModule) and installation orchestration (e.g., installFromUrl). These functions are implicated because they directly process the attacker-controlled input and lack safeguards against remote code inclusion. Confidence is high for ModuleInstaller::downloadModule due to its direct role in handling ZIP URLs, and medium for Modules::installFromUrl due to inferred responsibility for installation workflow.