CVE-2024-30500

CubeWP – All-in-One Dynamic Content Framework <= 1.1.12 - Authenticated (Subscriber+) Arbitrary File Upload

criticalUnrestricted Upload of File with Dangerous Type
9.9
CVSS Score
9.9
CVSS Score
critical
Severity
1.1.13
Patched in
7d
Time to patch

Description

The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the cwp_import_data_callback() function in all versions up to, and including, 1.1.12. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
High
Confidentiality
High
Integrity
High
Availability

Technical Details

Affected versions<=1.1.12
PublishedMarch 28, 2024
Last updatedApril 3, 2024
Affected plugincubewp-framework

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.