The Multi Step Form plugin for WordPress is vulnerable to unauthorized limited file upload due to a missing capability check on the fw_upload_file AJAX action in all versions up to, and including, 1.7.23. This makes it possible for unauthenticated attackers to upload limited file types such as images.
References
Configurations
History
03 Mar 2025, 17:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3219723%40multi-step-form&new=3219723%40multi-step-form&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/f0a31fee-ccc2-4c3b-b198-6cb750188113?source=cve - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L100 - Product | |
References | () https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L30 - Product | |
First Time |
Mondula
Mondula multi Step Form |
|
CPE | cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:* |
16 Jan 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-16 10:15
Updated : 2025-03-03 17:42
NVD link : CVE-2024-12427
Mitre link : CVE-2024-12427
JSON object : View
Products Affected
mondula
- multi_step_form
CWE
CWE-862
Missing Authorization