Impact
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress allows authenticated users with Subscriber-level access or higher to upload files through the action_import_module() function in all versions up to 7.8.9.2. Incorrect file type validation permits any file type, which can be exploited to upload code that the server can execute, resulting in remote code execution on the host.
Affected Systems
This vulnerability affects installations of the Hustle plugin v7.8.9.2 and earlier, provided by wpmudev. The attack requires the plugin to be installed and activated on a WordPress site.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. EPSS is below 1%, so the likelihood of active exploitation is low, and the vulnerability is not currently listed in the CISA KEV catalog. An attacker must first attain the appropriate Hustle module permissions and an admin‑provided nonce to reach the upload functionality, but once achieved the impact can be significant.
OpenCVE Enrichment