Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54466 | The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'zetra_languageUpload' and 'zetra_fontsUpload' functions in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 09 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 May 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'zetra_languageUpload' and 'zetra_fontsUpload' functions in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
| Title | Envolve Plugin <= 1.0 - Unauthenticated Arbitrary File Upload via language_file and fonts_file | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-09T16:15:53.245Z
Reserved: 2024-11-22T12:24:04.575Z
Link: CVE-2024-11617
Updated: 2025-05-09T16:15:48.513Z
Status : Awaiting Analysis
Published: 2025-05-09T07:16:02.633
Modified: 2025-05-12T17:32:52.810
Link: CVE-2024-11617
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:23:19Z
EUVD