The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_admin_get_oembed' function in all versions up to, and including, 2.9.1.6. This makes it possible for unauthenticated attackers to read arbitrary files on the server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 21 Feb 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Undsgn
Undsgn uncode
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:*
Vendors & Products Undsgn
Undsgn uncode

Tue, 18 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 11:15:00 +0000

Type Values Removed Values Added
Description The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_admin_get_oembed' function in all versions up to, and including, 2.9.1.6. This makes it possible for unauthenticated attackers to read arbitrary files on the server.
Title Uncode <= 2.9.1.6 - Unauthenticated Arbitrary File Read in uncode_admin_get_oembed
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-18T14:23:39.182Z

Reserved: 2025-01-23T18:35:39.824Z

Link: CVE-2024-13681

cve-icon Vulnrichment

Updated: 2025-02-18T14:23:35.415Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-18T11:15:11.270

Modified: 2025-02-21T14:22:38.737

Link: CVE-2024-13681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.