The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to unauthorized arbitrary file deletion due to a missing capability check on the removeTempFiles() function and insufficient path validation on the 'file' parameter in all versions up to, and including, 5.7.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files which can make remote code execution possible when wp-config.php is deleted.
History

Fri, 13 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sonaar:mp3_audio_player_for_music\,_radio_\&_podcast:*:*:*:*:*:wordpress:*:*

Thu, 29 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonaar
Sonaar mp3 Audio Player For Music\, Radio \& Podcast
CPEs cpe:2.3:a:sonaar:mp3_audio_player_for_music\,_radio_\&_podcast:-:*:*:*:*:wordpress:*:*
Vendors & Products Sonaar
Sonaar mp3 Audio Player For Music\, Radio \& Podcast
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Aug 2024 04:15:00 +0000

Type Values Removed Values Added
Description The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to unauthorized arbitrary file deletion due to a missing capability check on the removeTempFiles() function and insufficient path validation on the 'file' parameter in all versions up to, and including, 5.7.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files which can make remote code execution possible when wp-config.php is deleted.
Title MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar <= 5.7.0.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-29T03:52:57.401Z

Updated: 2024-08-29T14:07:23.168Z

Reserved: 2024-08-15T17:01:22.836Z

Link: CVE-2024-7856

cve-icon Vulnrichment

Updated: 2024-08-29T14:07:18.633Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-29T11:15:29.173

Modified: 2024-09-13T18:14:47.280

Link: CVE-2024-7856

cve-icon Redhat

No data.