Authenticated Attackers Can Exploit Plugin Vulnerability to Execute Remote Code

CVE-2024-8480
8.8HIGH

Key Information

Vendor
Sirv
Status
Image Optimizer, Resizer And Cdn – Sirv
Vendor
CVE Published:
6 September 2024

Summary

The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'sirv_save_prevented_sizes' function in all versions up to, and including, 7.2.7. This makes it possible for authenticated attackers, with Contributor-level access and above, to exploit the 'sirv_upload_file_by_chunks_callback' function, which lacks proper file type validation, allowing attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Affected Version(s)

Image Optimizer, Resizer and CDN – Sirv <= 7.2.7

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Vulnerability Reserved.

  • Disclosed

Collectors

NVD DatabaseMitre Database

Credit

Nicola Scattaglia
.