The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the acym_extractArchive function in all versions up to, and including, 9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
27 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:wordpress:*:* | |
First Time |
Acymailing
Acymailing acymailing |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://plugins.trac.wordpress.org/browser/acymailing/trunk/back/libraries/wordpress/file.php#L47 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3137644/ - Patch | |
References | () https://plugins.trac.wordpress.org/changeset?old_path=%2Facymailing&old=3118953&new_path=%2Facymailing&new=3137644&sfp_email=&sfph_mail= - Patch | |
References | () https://wordpress.org/plugins/acymailing/#developers - Release Notes | |
References | () https://www.acymailing.com/changelog/ - Release Notes | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/0c747bc9-582c-4b9f-85a4-469c446d50f5?source=cve - Third Party Advisory |
22 Aug 2024, 12:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Aug 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-22 03:15
Updated : 2024-09-27 13:15
NVD link : CVE-2024-7384
Mitre link : CVE-2024-7384
CVE.ORG link : CVE-2024-7384
JSON object : View
Products Affected
acymailing
- acymailing
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type