Impact
The flaw in the Doccure WordPress theme arises from missing or deficient file type validation in the doccure_temp_file_uploader function. An attacker who is authenticated with a WordPress account that has at least subscriber-level privileges can supply arbitrary files, potentially including malicious scripts. Because the data is written to the site’s file system without proper restrictions, the attacker may trigger remote code execution or compromise site integrity.
Affected Systems
Dream Technologies’ Doccure WordPress theme, versions 1.5.0 and all earlier releases, used on WordPress sites.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.8, rating it as High severity. The EPSS score indicates a very low probability of exploitation in the wild (< 1%). It is currently not listed in the CISA KEV catalog. As the flaw requires authenticated access with subscriber or higher permissions, the attack vector is likely limited to users who can log into the WordPress backend with sufficient privileges. Once inside, the attacker can upload arbitrary files, and if a file with executable code is placed in a web‑accessible location, remote code execution becomes feasible.
OpenCVE Enrichment
EUVD