CVE-2024-30500
CubeWP – All-in-One Dynamic Content Framework <= 1.1.12 - Authenticated (Subscriber+) Arbitrary File Upload
criticalUnrestricted Upload of File with Dangerous Type
9.9
CVSS Score
9.9
CVSS Score
critical
Severity
1.1.13
Patched in
7d
Time to patch
Description
The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the cwp_import_data_callback() function in all versions up to, and including, 1.1.12. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HAttack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
High
Confidentiality
High
Integrity
High
Availability
Technical Details
Affected versions
<=1.1.12PublishedMarch 28, 2024
Last updatedApril 3, 2024
Affected plugincubewp-framework
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.