CVE-2023-39493Exposed Dangerous Method or Function in Editor

Severity
7.8HIGHNVD
EPSS
0.5%
top 35.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3

Description

PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsText method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker ca

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

2
CVEList
PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability2024-05-03
GHSA
GHSA-phvq-jrfx-8jhp: PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability2024-05-03
CVE-2023-39493 — Exposed Dangerous Method or Function | cvebase