Lucene search

K
cvelistWordfenceCVELIST:CVE-2024-4345
HistoryMay 07, 2024 - 8:31 a.m.

CVE-2024-4345

2024-05-0708:31:04
Wordfence
www.cve.org
2
startklar elementor addons
file upload
vulnerability
wordpress
remote code execution

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0

Percentile

15.5%

The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the ‘process’ function in the ‘startklarDropZoneUploadProcess’ class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.

CNA Affected

[
  {
    "vendor": "wshberlin",
    "product": "Startklar Elementor Addons",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.7.13",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0

Percentile

15.5%

Related for CVELIST:CVE-2024-4345