The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_recordMedia' function in all versions up to, and including, 2.9.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary files on the server.
References
Link | Resource |
---|---|
https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log | Release Notes |
https://www.wordfence.com/threat-intel/vulnerabilities/id/d592141d-191b-4739-bc0a-07549ef2f31b?source=cve | Third Party Advisory |
Configurations
History
21 Feb 2025, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:* | |
Summary |
|
|
References | () https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log - Release Notes | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/d592141d-191b-4739-bc0a-07549ef2f31b?source=cve - Third Party Advisory | |
First Time |
Undsgn uncode
Undsgn |
18 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 11:15
Updated : 2025-02-21 14:22
NVD link : CVE-2024-13691
Mitre link : CVE-2024-13691
CVE.ORG link : CVE-2024-13691
JSON object : View
Products Affected
undsgn
- uncode
CWE