Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable.
References
Link | Resource |
---|---|
https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964 | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:g5plus:auteur:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:april:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:benaa:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:beyot:*:*:*:*:*:wordpress:*:* |
|
First Time |
G5plus april
G5plus benaa G5plus beyot G5plus auteur G5plus |
02 May 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-02 04:15
Updated : 2025-05-06 15:25
NVD link : CVE-2024-13418
Mitre link : CVE-2024-13418
CVE.ORG link : CVE-2024-13418
JSON object : View
Products Affected
g5plus
- beyot
- benaa
- auteur
- april
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type