8.8
CVE-2025-3616
- EPSS 1.46%
- Veröffentlicht 22.04.2025 04:21:32
- Zuletzt bearbeitet 28.05.2025 17:38:29
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Greenshift 11.4 - 11.4.5 - Authenticated (Subscriber+) Arbitrary File Upload
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.
Mögliche Gegenmaßnahme
Greenshift – animation and page builder blocks: Update to version 11.4.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Greenshift – animation and page builder blocks
Version
11.4-11.4.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Greenshiftwp ≫ Greenshift - Animation And Page Builder Blocks SwPlatformwordpress Version >= 11.4 < 11.4.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.46% | 0.807 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.