CVE-2024-1468

The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*

History

05 Feb 2025, 18:12

Type Values Removed Values Added
CWE CWE-434
First Time Theme-fusion avada
Theme-fusion
CPE cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve - Third Party Advisory
References () https://avada.com/documentation/avada-changelog/ - () https://avada.com/documentation/avada-changelog/ - Release Notes

29 Feb 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 04:15

Updated : 2025-02-05 18:12


NVD link : CVE-2024-1468

Mitre link : CVE-2024-1468


JSON object : View

Products Affected

theme-fusion

  • avada
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type