Arbitrary File Upload Vulnerability in Favicon Generator WordPress Plugin
CVE-2024-7863
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 13 September 2024
Badges
Summary
The Favicon Generator plugin for WordPress prior to version 2.1 contains a vulnerability that permits the upload of arbitrary files due to insufficient file validation mechanisms. This absence of validation, compounded by a lack of Cross-Site Request Forgery (CSRF) protection, enables an attacker to exploit an authenticated admin session. Through this exploit, attackers could potentially upload malicious PHP files to the server, leading to various security concerns including unauthorized access, defacement, and data breaches.
Affected Version(s)
Favicon Generator (CLOSED) 0 < 2.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved