The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_recordMedia' function in all versions up to, and including, 2.9.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary files on the server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 21 Feb 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Undsgn
Undsgn uncode
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:*
Vendors & Products Undsgn
Undsgn uncode

Tue, 18 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 11:15:00 +0000

Type Values Removed Values Added
Description The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_recordMedia' function in all versions up to, and including, 2.9.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary files on the server.
Title Uncode <= 2.9.1.6 - Authenticated (Subscriber+) Arbitrary File Read in uncode_recordMedia
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-18T14:17:30.451Z

Reserved: 2025-01-23T19:22:58.928Z

Link: CVE-2024-13691

cve-icon Vulnrichment

Updated: 2025-02-18T14:17:25.416Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-18T11:15:11.430

Modified: 2025-02-21T14:22:06.687

Link: CVE-2024-13691

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.