Lucene search

K
cveWordfenceCVE-2024-4345
HistoryMay 07, 2024 - 9:15 a.m.

CVE-2024-4345

2024-05-0709:15:38
Wordfence
web.nvd.nist.gov
41
cve-2024-4345
startklar elementor addons
wordpress
arbitrary file uploads
insufficient file type validation
remote code execution
nvd

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

Low

EPSS

0

Percentile

15.5%

The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the ‘process’ function in the ‘startklarDropZoneUploadProcess’ class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.

Affected configurations

Vulners
Node
wshberlinstartklar_elementor_addonsRange1.7.13wordpress
VendorProductVersionCPE
wshberlinstartklar_elementor_addons*cpe:2.3:a:wshberlin:startklar_elementor_addons:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "wshberlin",
    "product": "Startklar Elementor Addons",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.7.13",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

Low

EPSS

0

Percentile

15.5%