The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all versions up to, and including, 67.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Sun, 24 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Dasinfomedia
Dasinfomedia wpgym Gym Management System
CPEs cpe:2.3:a:dasinfomedia:wpgym_gym_management_system:-:*:*:*:*:wordpress:*:*
Vendors & Products Dasinfomedia
Dasinfomedia wpgym Gym Management System
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 23 Nov 2024 07:45:00 +0000

Type Values Removed Values Added
Description The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all versions up to, and including, 67.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title WPGYM <= 67.1.0 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-23T07:38:06.409Z

Updated: 2024-11-24T18:32:32.882Z

Reserved: 2024-10-14T16:22:57.026Z

Link: CVE-2024-9942

cve-icon Vulnrichment

Updated: 2024-11-24T18:30:57.852Z

cve-icon NVD

Status : Received

Published: 2024-11-23T08:15:04.390

Modified: 2024-11-23T08:15:04.390

Link: CVE-2024-9942

cve-icon Redhat

No data.