Lucene search

K
vulnrichmentWordfenceVULNRICHMENT:CVE-2024-1468
HistoryFeb 29, 2024 - 3:30 a.m.

CVE-2024-1468

2024-02-2903:30:29
Wordfence
github.com
4
avada
website builder
wordpress
woocommerce
arbitrary file uploads
file type validation
ajax_import_options()
remote code execution
cve-2024-1468

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:avada:website_builder:*:*:*:*:*:*:*:*"
    ],
    "vendor": "avada",
    "product": "website_builder",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "7.11.5",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-1468