All the vulnerabilites related to Kingsoft - WPS Office
cve-2024-13187
Vulnerability from cvelistv5
Published
2025-01-08 16:31
Modified
2025-01-08 20:38
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Kingsoft WPS Office TCC code injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.290779 | vdb-entry | |
https://vuldb.com/?ctiid.290779 | signature, permissions-required | |
https://vuldb.com/?submit.468013 | third-party-advisory | |
https://github.com/Rsec-1/wps | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Kingsoft | WPS Office |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-13187", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T20:37:39.787156Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T20:38:46.481Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/Rsec-1/wps" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "TCC Handler" ], "product": "WPS Office", "vendor": "Kingsoft", "versions": [ { "status": "affected", "version": "6.14.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "RSec (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Kingsoft WPS Office 6.14.0 on macOS. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component TCC Handler. The manipulation leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In Kingsoft WPS Office 6.14.0 f\u00fcr macOS wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Komponente TCC Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "Code Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T16:31:04.785Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-290779 | Kingsoft WPS Office TCC code injection", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.290779" }, { "name": "VDB-290779 | CTI Indicators (IOB, IOC, TTP)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.290779" }, { "name": "Submit #468013 | https://www.wps.com/ WPS Mac 6.14.0 Privilege Defined With Unsafe Actions", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.468013" }, { "tags": [ "exploit" ], "url": "https://github.com/Rsec-1/wps" } ], "timeline": [ { "lang": "en", "time": "2025-01-08T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-01-08T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-01-08T13:02:09.000Z", "value": "VulDB entry last update" } ], "title": "Kingsoft WPS Office TCC code injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2024-13187", "datePublished": "2025-01-08T16:31:04.785Z", "dateReserved": "2025-01-08T11:56:57.844Z", "dateUpdated": "2025-01-08T20:38:46.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7262
Vulnerability from cvelistv5
Published
2024-08-15 14:24
Modified
2024-09-03 16:20
Severity ?
EPSS score ?
Summary
Arbitrary Code Execution in WPS Office
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Kingsoft | WPS Office |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:kingsoft:wps_office:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wps_office", "vendor": "kingsoft", "versions": [ { "lessThan": "12.2.0.13489", "status": "affected", "version": "12.2.0.13110", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7262", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-31T03:55:30.362677Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-09-03", "reference": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T16:20:22.356Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-09-03T00:00:00+00:00", "value": "CVE-2024-7262 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.wps.com/", "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "WPS Office", "vendor": "Kingsoft", "versions": [ { "lessThan": "12.2.0.16412", "status": "affected", "version": "12.2.0.13110", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "analyst", "value": "Romain DUMONT (ESET)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eImproper path validation in \u003cb\u003epromecefpluginhost.exe\u003c/b\u003e in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.\u003cbr\u003eThe vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document\u003cbr\u003e\u003c/div\u003e" } ], "value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.\nThe vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document" } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Exploit found in-the-wild.\u003cbr\u003e" } ], "value": "Exploit found in-the-wild." } ], "impacts": [ { "capecId": "CAPEC-17", "descriptions": [ { "lang": "en", "value": "CAPEC-17: Using Malicious Files" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:N/RE:L", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "LOW" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "A user clicking on a crafted hyperlink could lead to arbitrary code execution" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-22T05:51:23.952Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://www.wps.com/whatsnew/pc/20240422/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to latest version\u003cbr\u003e" } ], "value": "Update to latest version" } ], "source": { "discovery": "EXTERNAL" }, "tags": [ "x_known-exploited-vulnerability" ], "title": "Arbitrary Code Execution in WPS Office", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2024-7262", "datePublished": "2024-08-15T14:24:44.511Z", "dateReserved": "2024-07-30T07:50:53.765Z", "dateUpdated": "2024-09-03T16:20:22.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2516
Vulnerability from cvelistv5
Published
2025-03-27 14:29
Modified
2025-03-27 15:15
Severity ?
EPSS score ?
Summary
Use of a weak cryptographic key in the signature verification process in WPS Office
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Kingsoft | WPS Office |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2516", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-27T15:15:47.648387Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-27T15:15:56.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.wps.com/", "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "WPS Office", "vendor": "Kingsoft", "versions": [ { "status": "unknown", "version": "12.1.0.18276", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eThe use of a weak cryptographic key pair in the signature verification process in WPS Office (Kingsoft) on Windows allows an attacker who successfully recovered the private key to sign components.\u003c/div\u003e\u003cdiv\u003eAs older versions of WPS Office did not validate the update server\u0027s certificate, an Adversary-In-The-Middle attack was possible allowing updates to be hijacked.\u003c/div\u003e" } ], "value": "The use of a weak cryptographic key pair in the signature verification process in WPS Office (Kingsoft) on Windows allows an attacker who successfully recovered the private key to sign components.\n\nAs older versions of WPS Office did not validate the update server\u0027s certificate, an Adversary-In-The-Middle attack was possible allowing updates to be hijacked." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability was also found by a threat actor who weaponized it.\u003cbr\u003e" } ], "value": "This vulnerability was also found by a threat actor who weaponized it." } ], "impacts": [ { "capecId": "CAPEC-20", "descriptions": [ { "lang": "en", "value": "CAPEC-20 Encryption Brute Forcing" } ] }, { "capecId": "CAPEC-187", "descriptions": [ { "lang": "en", "value": "CAPEC-187 Malicious Automated Software Update via Redirection" } ] }, { "capecId": "CAPEC-485", "descriptions": [ { "lang": "en", "value": "CAPEC-485 Signature Spoofing by Key Recreation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.5, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T14:29:22.907Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Use of a weak cryptographic key in the signature verification process in WPS Office", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2025-2516", "datePublished": "2025-03-27T14:29:22.907Z", "dateReserved": "2025-03-19T07:49:48.800Z", "dateUpdated": "2025-03-27T15:15:56.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11957
Vulnerability from cvelistv5
Published
2025-03-04 15:41
Modified
2025-03-05 08:05
Severity ?
EPSS score ?
Summary
Arbitrary Code Execution in WPS Office
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Kingsoft | WPS Office |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11957", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T16:07:01.405481Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T16:07:20.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.wps.com/", "defaultStatus": "unknown", "modules": [ "ksojscore.dll" ], "platforms": [ "Windows" ], "product": "WPS Office", "vendor": "Kingsoft", "versions": [ { "lessThan": "12.1.0.18276", "status": "affected", "version": "12.2.0.16909", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Romain DUMONT (ESET)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276\n\n on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough.\u003cbr\u003e" } ], "value": "Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276\n\n on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability was also found by an unknown threat actor who weaponized it.\u003cbr\u003e" } ], "value": "This vulnerability was also found by an unknown threat actor who weaponized it." } ], "impacts": [ { "capecId": "CAPEC-475", "descriptions": [ { "lang": "en", "value": "CAPEC-475: Signature Spoofing by Improper Validation" } ] }, { "capecId": "CAPEC-17", "descriptions": [ { "lang": "en", "value": "CAPEC-17: Using Malicious Files" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347: Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-05T08:05:18.805Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary Code Execution in WPS Office", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2024-11957", "datePublished": "2025-03-04T15:41:00.514Z", "dateReserved": "2024-11-28T07:42:29.586Z", "dateUpdated": "2025-03-05T08:05:18.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7263
Vulnerability from cvelistv5
Published
2024-08-15 14:29
Modified
2024-08-22 05:46
Severity ?
EPSS score ?
Summary
Arbitrary Code Execution in WPS Office
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Kingsoft | WPS Office |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:kingsoft:wps_office:12.2.0.13110:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wps_office", "vendor": "kingsoft", "versions": [ { "lessThanOrEqual": "12.2.0.17153", "status": "affected", "version": "12.2.0.13110", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7263", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T13:36:15.984437Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T13:38:20.971Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://www.wps.com/", "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "WPS Office", "vendor": "Kingsoft", "versions": [ { "changes": [ { "at": "12.1.0.17119", "status": "unaffected" } ], "lessThan": "12.2.0.17115", "status": "affected", "version": "12.2.0.13110", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Romain DUMONT (ESET)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper path validation in \u003cb\u003epromecefpluginhost.exe\u003c/b\u003e in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.17115 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.\u003cbr\u003eThe patch released in version 12.1.0.17119 to mitigate CVE-2024-7262 was not restrictive enough. Another parameter was not properly sanitized which leads to the execution of an arbitrary Windows library.\u003cbr\u003e" } ], "value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.17115 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.\nThe patch released in version 12.1.0.17119 to mitigate CVE-2024-7262 was not restrictive enough. Another parameter was not properly sanitized which leads to the execution of an arbitrary Windows library." } ], "impacts": [ { "capecId": "CAPEC-17", "descriptions": [ { "lang": "en", "value": "CAPEC-17: Using Malicious Files" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "A user clicking on a crafted hyperlink could lead to arbitrary code execution" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-22T05:46:47.221Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://www.wps.com/whatsnew/pc/20240422/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to latest version\u003cbr\u003e" } ], "value": "Update to latest version" } ], "source": { "discovery": "USER" }, "title": "Arbitrary Code Execution in WPS Office", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2024-7263", "datePublished": "2024-08-15T14:29:04.097Z", "dateReserved": "2024-07-30T07:50:57.690Z", "dateUpdated": "2024-08-22T05:46:47.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }