Impact
The vulnerability allows an attacker to upload arbitrary files, including web shells, via the Ona theme's upload interface. Based on the description, it is inferred that uploading a web shell could enable execution of arbitrary code with the web server's privileges, potentially leading to compromise of the WordPress site, depending on available upload permissions.
Affected Systems
The issue affects installations of the deothemes Ona WordPress theme with any version earlier than 1.24, from the earliest available release up to, but not including, 1.24.
Risk and Exploitability
The CVSS score of 9.9 indicates a critical severity. The EPSS score is less than 1%, suggesting low current exploitation prevalence. Since the vulnerability is not listed in the CISA KEV catalog, there is no known active exploitation campaigns. The attack vector is likely via the theme's file upload interface, which may require an authenticated user with upload rights. The exploitation path is straightforward: upload a malicious file and leverage it to execute code. The high severity and potential for remote code execution make this a high priority risk for any affected WordPress site.
OpenCVE Enrichment