- Description
- The PlugVersions – Easily rollback to previous versions of your plugins plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the eos_plugin_reviews_restore_version() function in all versions up to, and including, 0.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files leveraging files included locally.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security@wordfence.com
- CWE-862
- Hype score
- Not currently trending
CVE-2024-12881 (CVSS:8.8, HIGH) is Received. The PlugVersions – Easily rollback to previous versions of your plugins plugin for WordPress is vulnerable to arbitrary ..https://t.co/2GIX4lwWW9 #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
28 Dec 2024
6 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE Alert: CVE-2024-12881 - https://t.co/Ay84KuCYmg #OSINT #ThreatIntel #CyberSecurity #cve_2024_12881
@RedPacketSec
25 Dec 2024
104 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12881 The PlugVersions – Easily rollback to previous versions of your plugins plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check… https://t.co/pspnvfmmwl
@CVEnew
24 Dec 2024
394 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-12881: HIGH] Critical vulnerability in PlugVersions WordPress plugin up to v0.0.7 allows file uploads by attackers with Subscriber-level access. Update immediately to avoid potential cyber threats.#cybersecurity,#vulnerability https://t.co/VNH2oxSc5O https://t.co/TJcIv7
@CveFindCom
24 Dec 2024
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes