Overview
- Description
- The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 16.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- security@wordfence.com
- CWE-22
Social media
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
馃毃 CVE-2024-11150 (Published: 2024-11-13) - A critical vulnerability affecting Wordfence. Ensure your installations are updated to the latest version to mitigate risks. For detailed remediation steps, visit: https://t.co/p3Hkp8dOzQ #CyberSecurity #Wordfence
@transilienceai
17 Nov 2024
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11150 (Published: 2024-11-13) - A critical vulnerability affecting Wordfence. Ensure your installations are updated to the latest version to mitigate risks. For detailed remediation steps, visit: https://t.co/p3Hkp8dOzQ #CyberSecurity #Wordfence
@transilienceai
17 Nov 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes