An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 17 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-17T17:24:39.408Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24676
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T11:03:18.818Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-01-24T21:15:08.327
Modified: 2025-10-17T18:15:35.553
Link: CVE-2023-24676
 Redhat
                        Redhat
                    No data.