The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'gspb_save_files' function in versions up to, and including, 7.6.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php?rev=3006373#L867 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3009030/greenshift-animation-and-page-builder-blocks/trunk/settings.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/821462d6-970e-4e3e-b91d-e7153296ba9f?source=cve - Third Party Advisory |
17 Jan 2024, 21:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-11 09:15
Updated : 2024-11-21 08:44
NVD link : CVE-2023-6636
Mitre link : CVE-2023-6636
CVE.ORG link : CVE-2023-6636
JSON object : View
Products Affected
greenshiftwp
- greenshift_-_animation_and_page_builder_blocks
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type