The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, and including, 16.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. User registration must be enabled for this to be exploited.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vanquish
Vanquish wordpress User Extra Fields |
|
CPEs | cpe:2.3:a:vanquish:wordpress_user_extra_fields:*:*:*:*:*:*:*:* | |
Vendors & Products |
Vanquish
Vanquish wordpress User Extra Fields |
|
Metrics |
ssvc
|
Sat, 09 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, and including, 16.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. User registration must be enabled for this to be exploited. | |
Title | WordPress User Extra Fields <= 16.5 - Unauthenticated Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-09T07:35:05.848Z
Updated: 2024-11-12T18:35:06.961Z
Reserved: 2024-11-04T16:30:03.828Z
Link: CVE-2024-10801
Vulnrichment
Updated: 2024-11-12T18:35:01.469Z
NVD
Status : Awaiting Analysis
Published: 2024-11-09T08:15:04.260
Modified: 2024-11-12T13:56:24.513
Link: CVE-2024-10801
Redhat
No data.