9.8
CVE-2023-0714
- EPSS 13.92%
- Veröffentlicht 17.08.2024 10:15:06
- Zuletzt bearbeitet 23.04.2025 17:30:05
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Metform Elementor Contact Form Builder <= 3.2.4 - Unauthenticated Double-Extension Arbitrary File Upload
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Arbitrary File Upload due to insufficient file type validation in versions up to, and including, 3.2.4. This allows unauthenticated visitors to perform a "double extension" attack and upload files containing a malicious extension but ending with a benign extension, which may make remote code execution possible in some configurations.
Mögliche Gegenmaßnahme
MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor: Update to version 3.3.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor
Version
*-3.2.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpmet ≫ Metform Elementor Contact Form Builder SwPlatformwordpress Version < 3.3.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 13.92% | 0.941 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| security@wordfence.com | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.