- Description
- The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 16.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
- Source
- security@wordfence.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-22
- Hype score
- Not currently trending
🚨 CVE-2024-11150 (Published: 2024-11-13) - A critical vulnerability affecting Wordfence. Ensure your installations are updated to the latest version to mitigate risks. For detailed remediation steps, visit: https://t.co/p3Hkp8dOzQ #CyberSecurity #Wordfence
@transilienceai
17 Nov 2024
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11150 (Published: 2024-11-13) - A critical vulnerability affecting Wordfence. Ensure your installations are updated to the latest version to mitigate risks. For detailed remediation steps, visit: https://t.co/p3Hkp8dOzQ #CyberSecurity #Wordfence
@transilienceai
17 Nov 2024
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vanquish:user_extra_fields:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "51950C34-787B-4170-BD3D-E8D82995ACDB",
"versionEndExcluding": "16.7"
}
],
"operator": "OR"
}
]
}
]