9.8

CVE-2019-25138

Exploit

User Submitted Posts <= 20190312 - Unauthenticated Arbitrary File Upload

The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Mögliche Gegenmaßnahme
User Submitted Posts – Enable Users to Submit Posts from the Front End: Update to version 20190426, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Product User Submitted Posts – Enable Users to Submit Posts from the Front End
Version [*, 20190426)
Data is provided by the National Vulnerability Database (NVD)
Plugin-planetUser Submitted Posts SwPlatformwordpress Version <= 20190312
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.58% 0.866
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security@wordfence.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-434 Unrestricted Upload of File with Dangerous Type

The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.