The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the acym_extractArchive function in all versions up to, and including, 9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Sep 2024 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:wordpress:*:*

Thu, 22 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Acymailing
Acymailing acymailing
CPEs cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:*:*:*
Vendors & Products Acymailing
Acymailing acymailing
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 02:30:00 +0000

Type Values Removed Values Added
Description The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the acym_extractArchive function in all versions up to, and including, 9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title AcyMailing <= 9.7.2 - Authenticated (Subscriber+) Arbitrary File Upload via acym_extractArchive Function
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-22T14:26:47.662Z

Reserved: 2024-08-01T14:30:24.680Z

Link: CVE-2024-7384

cve-icon Vulnrichment

Updated: 2024-08-22T14:25:12.121Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-22T03:15:04.130

Modified: 2024-09-27T13:15:28.443

Link: CVE-2024-7384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.