Arbitrary File Upload Vulnerability in WP STAGING WordPress Backup Plugin
CVE-2024-3412
9.1CRITICAL
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 29 May 2024
What is CVE-2024-3412?
The WP STAGING WordPress Backup Plugin β Migration Backup Restore is susceptible to arbitrary file upload vulnerabilities due to inadequate file type validation in the wpstg_processing AJAX action. This flaw affects all versions up to and including 3.4.3, allowing authenticated attackers with administrator-level access to upload unauthorized files to the server. Such actions could potentially lead to remote code execution, compromising the security of the affected WordPress site.
Affected Version(s)
WP STAGING β WordPress Backup, Restore & Migration 0 <= 3.4.3
References
EPSS Score
8% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
haidv35