{"id":"CVE-2023-36220","details":"Directory Traversal vulnerability in Textpattern CMS v4.8.8 allows a remote authenticated attacker to execute arbitrary code and gain access to sensitive information via the plugin Upload function.","modified":"2026-04-10T05:00:06.719010Z","published":"2023-08-07T14:15:11.233Z","references":[{"type":"WEB","url":"https://release-demo.textpattern.co/"},{"type":"WEB","url":"https://textpattern.com/"},{"type":"ADVISORY","url":"https://textpattern.com/file_download/118/textpattern-4.8.8.zip"},{"type":"EVIDENCE","url":"https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/textpattern/textpattern","events":[{"introduced":"0"},{"last_affected":"b90acf00e63e2be98f81e1cde58a5bea4b31dee9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.8.8"}]}}],"versions":["4.2.0","4.3.0","4.4.0","4.4.1","4.5.0","4.5.1","4.5.2","4.6.0","4.6.0-beta","4.6.0-beta.2","4.6.0-beta.3","4.7.0","4.7.0-beta","4.7.0-beta.2","4.7.0-beta.3","4.7.0-rc.1","4.7.2","4.8.0-beta.2","4.8.1","4.8.2","4.8.3","4.8.4","4.8.5","4.8.6","4.8.7","4.8.8","4.8.8-beta.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36220.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}