Arbitrary File Upload Vulnerability in Keydatas Plugin for WordPress
CVE-2024-6220

9.8CRITICAL

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
17 July 2024

What is CVE-2024-6220?

The Keydatas plugin for WordPress is susceptible to arbitrary file upload vulnerabilities due to improper file type validation in the keydatas_downloadImages function, present in all versions up to and including 2.5.2. This flaw permits unauthenticated users to upload various files onto the server hosting the affected site. By exploiting this loophole, attackers may achieve remote code execution, potentially compromising the site’s integrity and security. It is crucial to apply the latest security patches and implement security measures to protect against such vulnerabilities.

Affected Version(s)

简数采集器 * <= 2.5.2

References

EPSS Score

31% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Friderika Baranyai
.