CVE-2024-6220

The ????? (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:keydatas:keydatas:*:*:*:*:*:wordpress:*:*

History

19 Jul 2024, 16:07

Type Values Removed Values Added
First Time Keydatas
Keydatas keydatas
CWE CWE-434
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/49ae7971-7bdf-4369-b04b-fb48ea5b9518?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/49ae7971-7bdf-4369-b04b-fb48ea5b9518?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/keydatas/trunk/keydatas.php - () https://plugins.trac.wordpress.org/browser/keydatas/trunk/keydatas.php - Patch
CPE cpe:2.3:a:keydatas:keydatas:*:*:*:*:*:wordpress:*:*

17 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-17 08:15

Updated : 2024-08-01 22:15


NVD link : CVE-2024-6220

Mitre link : CVE-2024-6220


JSON object : View

Products Affected

keydatas

  • keydatas
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type