The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all versions up to, and including, 67.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
26 Nov 2024, 19:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bae5f22d-5085-4230-a7fc-5db85aa6fbdb?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:mojoomla:wordpress_gym_management_system:*:*:*:*:*:wordpress:*:* | |
First Time |
Mojoomla
Mojoomla wordpress Gym Management System |
|
Summary |
|
23 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-23 08:15
Updated : 2024-11-26 19:33
NVD link : CVE-2024-9942
Mitre link : CVE-2024-9942
CVE.ORG link : CVE-2024-9942
JSON object : View
Products Affected
mojoomla
- wordpress_gym_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type