CVE-2024-7384

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the acym_extractArchive function in all versions up to, and including, 9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:wordpress:*:*

History

27 Sep 2024, 13:15

Type Values Removed Values Added
CPE cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:wordpress:*:*
First Time Acymailing
Acymailing acymailing
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.8
References () https://plugins.trac.wordpress.org/browser/acymailing/trunk/back/libraries/wordpress/file.php#L47 - () https://plugins.trac.wordpress.org/browser/acymailing/trunk/back/libraries/wordpress/file.php#L47 - Product
References () https://plugins.trac.wordpress.org/changeset/3137644/ - () https://plugins.trac.wordpress.org/changeset/3137644/ - Patch
References () https://plugins.trac.wordpress.org/changeset?old_path=%2Facymailing&old=3118953&new_path=%2Facymailing&new=3137644&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?old_path=%2Facymailing&old=3118953&new_path=%2Facymailing&new=3137644&sfp_email=&sfph_mail= - Patch
References () https://wordpress.org/plugins/acymailing/#developers - () https://wordpress.org/plugins/acymailing/#developers - Release Notes
References () https://www.acymailing.com/changelog/ - () https://www.acymailing.com/changelog/ - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/0c747bc9-582c-4b9f-85a4-469c446d50f5?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/0c747bc9-582c-4b9f-85a4-469c446d50f5?source=cve - Third Party Advisory

22 Aug 2024, 12:48

Type Values Removed Values Added
Summary
  • (es) El complemento AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validación del tipo de archivo en la función acym_extractArchive en todas las versiones hasta la 9.7.2 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código.

22 Aug 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-22 03:15

Updated : 2024-09-27 13:15


NVD link : CVE-2024-7384

Mitre link : CVE-2024-7384

CVE.ORG link : CVE-2024-7384


JSON object : View

Products Affected

acymailing

  • acymailing
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type