Arbitrary File Deletion Vulnerability in WordPress User Extra Fields Plugin
CVE-2024-11150
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 13 November 2024
Summary
The WordPress User Extra Fields plugin is affected by a vulnerability that allows unauthenticated attackers to delete arbitrary files from a server due to inadequate validation of file paths in the delete_tmp_uploaded_file() function. This flaw exists in all versions up to and including 16.6. The ability to delete critical files, such as wp-config.php, could enable remote code execution, substantially compromising server security and integrity.
Affected Version(s)
WordPress User Extra Fields * <= 16.6
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Chloe Chamberland