Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable.
References
Link | Resource |
---|---|
https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964 | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:g5plus:benaa:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:april:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:beyot:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:auteur:*:*:*:*:*:wordpress:*:* |
|
First Time |
G5plus auteur
G5plus beyot G5plus april G5plus G5plus benaa |
|
Summary |
|
|
References | () https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve - Third Party Advisory |
02 May 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-02 04:15
Updated : 2025-05-06 15:25
NVD link : CVE-2024-13418
Mitre link : CVE-2024-13418
CVE.ORG link : CVE-2024-13418
JSON object : View
Products Affected
g5plus
- april
- benaa
- auteur
- beyot
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type