The Social Auto Poster plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpw_auto_poster_get_image_path' function in all versions up to, and including, 5.3.14. This makes it possible for authenticated attackers, with Contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible. An attacker can use CVE-2024-6754 to exploit with subscriber-level access.
References
Configurations
History
03 Sep 2024, 21:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://codecanyon.net/item/social-auto-poster-wordpress-scheduler-marketing-plugin/5754169 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/24e00c0d-08ff-4c68-a1dd-77b513545efd?source=cve - Third Party Advisory | |
First Time |
Wpwebinfotech social Auto Poster
Wpwebinfotech |
|
CPE | cpe:2.3:a:wpwebinfotech:social_auto_poster:*:*:*:*:*:wordpress:*:* |
24 Jul 2024, 12:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Jul 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-24 03:15
Updated : 2024-09-03 21:29
NVD link : CVE-2024-6756
Mitre link : CVE-2024-6756
CVE.ORG link : CVE-2024-6756
JSON object : View
Products Affected
wpwebinfotech
- social_auto_poster
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type