Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable.
References
Link | Resource |
---|---|
https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964 | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:g5plus:benaa:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:beyot:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:auteur:*:*:*:*:*:wordpress:*:* cpe:2.3:a:g5plus:april:*:*:*:*:*:wordpress:*:* |
|
First Time |
G5plus april
G5plus auteur G5plus benaa G5plus G5plus beyot |
|
Summary |
|
|
References | () https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve - Third Party Advisory |
02 May 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-02 04:15
Updated : 2025-05-06 15:25
NVD link : CVE-2024-13418
Mitre link : CVE-2024-13418
CVE.ORG link : CVE-2024-13418
JSON object : View
Products Affected
g5plus
- april
- benaa
- auteur
- beyot
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type