- Description
- Unrestricted Upload of File with Dangerous Type vulnerability in mahlamusa Multi Purpose Mail Form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through 1.0.2.
- Source
- audit@patchstack.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- audit@patchstack.com
- CWE-434
- Hype score
- Not currently trending
0-click RCE (Unauthenticated/Pre-auth) Exploit for CVE-2024-50526🤓 #WordPress #BugBounty https://t.co/lrIge4mKUm
@JoshuaProvoste
21 Nov 2024
6223 Impressions
12 Retweets
118 Likes
31 Bookmarks
0 Replies
0 Quotes
[CVE-2024-50526: CRITICAL] Critical security flaw found in Multi Purpose Mail Form (versions n/a-1.0.2) allows unrestricted upload of dangerous files, leading to potential web server compromise. #CyberSecurity#cybersecurity,#vulnerability https://t.co/9gk6fqoNMA https://t.co/dGSw
@CveFindCom
4 Nov 2024
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-50526 Unrestricted Upload of File with Dangerous Type vulnerability in mahlamusa Multi Purpose Mail Form allows Upload a Web Shell to a Web Server.This issue affects Multi … https://t.co/U1c1hyfVEu
@CVEnew
4 Nov 2024
169 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lindeni:multi_purpose_mail_form:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "A461AE0C-3ED4-4C94-82E7-9E2B03842EC0",
"versionEndIncluding": "1.0.2"
}
],
"operator": "OR"
}
]
}
]