Impact
The Newscrunch theme is vulnerable to arbitrary file uploads because the newscrunch_install_and_activate_plugin() function omits a capability check. An authenticated user with Subscriber-level or higher privileges can leverage the plugin activation process to upload any file to the server. If the uploaded file contains executable code, the function may enable remote code execution, compromising the application and potentially the host OS. This flaw is classified as CWE-862.
Affected Systems
All installations of the Newscrunch WordPress theme developed by spicethemes are affected, specifically versions 1.8.4.1 and earlier.
Risk and Exploitability
The CVSS score of 9.8 categorizes the issue as critical. The EPSS score of 28% indicates a high likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, yet the combination of severe impact and significant exploitation probability makes it a top remediation priority. Attackers only need valid authenticated credentials with at least Subscriber privilege to exploit the flaw via the plugin activation mechanism, and can then upload executable content to the server.
OpenCVE Enrichment