The Tumult Hype Animations plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the hypeanimations_panel() function in all versions up to, and including, 1.9.15. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tumult
Tumult tumult Hype Animations |
|
CPEs | cpe:2.3:a:tumult:tumult_hype_animations:*:*:*:*:*:*:*:* | |
Vendors & Products |
Tumult
Tumult tumult Hype Animations |
|
Metrics |
ssvc
|
Thu, 28 Nov 2024 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Tumult Hype Animations plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the hypeanimations_panel() function in all versions up to, and including, 1.9.15. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
Title | Tumult Hype Animations <= 1.9.15 - Authenticated (Author+) Arbitrary File Upload via hypeanimations_panel Function | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-28T09:47:12.805Z
Updated: 2024-11-29T19:12:37.946Z
Reserved: 2024-11-11T18:49:58.903Z
Link: CVE-2024-11082
Vulnrichment
Updated: 2024-11-29T19:12:30.435Z
NVD
Status : Received
Published: 2024-11-28T10:15:05.973
Modified: 2024-11-28T10:15:05.973
Link: CVE-2024-11082
Redhat
No data.