CVE-2024-8725

Sept. 26, 2024, 1:32 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

WordPress

Source

security@wordfence.com

Tags

CVE-2024-8725 details

Published : Sept. 26, 2024, 11:15 a.m.
Last Modified : Sept. 26, 2024, 1:32 p.m.

Description

Multiple plugins and/or themes for WordPress are vulnerable to Limited File Upload in various versions. This is due to a lack of proper checks to ensure lower-privileged roles cannot upload .css and .js files to arbitrary directories. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files to any directory within the WordPress root directory, which could lead to Stored Cross-Site Scripting. The Advanced File Manager Shortcodes plugin must be installed to exploit this vulnerability.

CVSS Score

1 2 3 4 5 6.8 7 8 9 10

Weakness

Weakness Name Description
CWE-434 Unrestricted Upload of File with Dangerous Type The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score

6.8

Exploitability Score

1.6

Impact Score

5.2

Base Severity

MEDIUM

This website uses the NVD API, but is not approved or certified by it.