Arbitrary File Upload Vulnerability in Keydatas Plugin for WordPress
CVE-2024-6220
9.8CRITICAL
What is CVE-2024-6220?
The Keydatas plugin for WordPress is susceptible to arbitrary file upload vulnerabilities due to improper file type validation in the keydatas_downloadImages function, present in all versions up to and including 2.5.2. This flaw permits unauthenticated users to upload various files onto the server hosting the affected site. By exploiting this loophole, attackers may achieve remote code execution, potentially compromising the site’s integrity and security. It is crucial to apply the latest security patches and implement security measures to protect against such vulnerabilities.
Affected Version(s)
简数采集器 * <= 2.5.2
References
EPSS Score
31% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Friderika Baranyai