The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files that can lead to remote code execution.
References
Configurations
History
17 Jan 2025, 20:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset/3216237/wp-webinarsystem/trunk/includes/class-webinarsysteem-ajax.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c2cb3f-2f9e-40c5-9e5f-5b85a53e5868?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:* | |
First Time |
Webinarpress
Webinarpress webinarpress |
08 Jan 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-08 05:15
Updated : 2025-01-17 20:56
NVD link : CVE-2024-11270
Mitre link : CVE-2024-11270
CVE.ORG link : CVE-2024-11270
JSON object : View
Products Affected
webinarpress
- webinarpress
CWE
CWE-862
Missing Authorization