Overview
- Description
- The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- security@wordfence.com
- CWE-434
Social media
- Hype score
- Not currently trending
[CVE-2024-9932: CRITICAL] WordPress Wux Blog Editor plugin (up to 3.0.0) has a security flaw allowing unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution.#cybersecurity,#vulnerability https://t.co/pAUvGOUxpD https://t.co/1cCRI0R9Ec
@CveFindCom
26 Oct 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-9932 The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in vers… https://t.co/7MU2Zjz0zU
@CVEnew
26 Oct 2024
530 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes