Overview
- Description
- The mFolio Lite plugin for WordPress is vulnerable to file uploads due to a missing capability check in all versions up to, and including, 1.2.1. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file or upload arbitrary EXE files on the affected site's server which may make remote code execution possible if the attacker can also gain access to run the .exe file, or trick a site visitor into downloading and running the .exe file.
- Source
- security@wordfence.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- security@wordfence.com
- CWE-434
Social media
- Hype score
- Not currently trending
[CVE-2024-9307: CRITICAL] WordPress mFolio Lite plugin <=1.2.1 has a file upload vulnerability for Author-level users, allowing arbitrary script injection and EXE file uploads, risking remote code execution.#cybersecurity,#vulnerability https://t.co/Jf8mQAMwq1 https://t.co/rDv
@CveFindCom
6 Nov 2024
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-9307 The mFolio Lite plugin for WordPress is vulnerable to file uploads due to a missing capability check in all versions up to, and including, 1.2.1. This makes it possible… https://t.co/fJ5ZYSCXKK
@CVEnew
6 Nov 2024
751 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:themelooks:mfolio:*:*:*:*:lite:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "6900B9BF-BA00-426A-B1B2-C59A41EC6CD3", "versionEndIncluding": "1.2.1" } ], "operator": "OR" } ] } ]