The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2954409/forminator/trunk/library/fields/postdata.php | Patch |
https://www.exploit-db.com/exploits/51664 | Exploit Third Party Advisory VDB Entry |
https://www.wordfence.com/threat-intel/vulnerabilities/id/9cd87da6-1f4c-4a15-8ebb-6e0f8ef72513?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-08-30T01:45:37.073Z
Updated: 2023-08-30T01:45:37.073Z
Reserved: 2023-08-29T13:03:40.119Z
Link: CVE-2023-4596
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-30T02:15:09.353
Modified: 2023-11-07T04:22:46.670
Link: CVE-2023-4596
JSON object: View
Redhat Information
No data.
CWE
No CWE.