CVE-2024-9307

The mFolio Lite plugin for WordPress is vulnerable to file uploads due to a missing capability check in all versions up to, and including, 1.2.1. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file or upload arbitrary EXE files on the affected site's server which may make remote code execution possible if the attacker can also gain access to run the .exe file, or trick a site visitor into downloading and running the .exe file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themelooks:mfolio:*:*:*:*:lite:wordpress:*:*

History

08 Nov 2024, 21:18

Type Values Removed Values Added
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/3b4012dd-7c0a-45f1-8ada-8f9dc6867e1e?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/3b4012dd-7c0a-45f1-8ada-8f9dc6867e1e?source=cve - Third Party Advisory
References () https://wordpress.org/plugins/mfolio-lite/#developers - () https://wordpress.org/plugins/mfolio-lite/#developers - Release Notes
CVSS v2 : unknown
v3 : 9.9
v2 : unknown
v3 : 8.8
First Time Themelooks
Themelooks mfolio
CPE cpe:2.3:a:themelooks:mfolio:*:*:*:*:lite:wordpress:*:*

06 Nov 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-06 07:15

Updated : 2024-11-08 21:18


NVD link : CVE-2024-9307

Mitre link : CVE-2024-9307


JSON object : View

Products Affected

themelooks

  • mfolio
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type