Authenticated Attackers Can Exploit Plugin Vulnerability to Execute Remote Code
CVE-2024-8480

8.8HIGH

Key Information:

Vendor
Sirv
Status
Image Optimizer, Resizer And Cdn – Sirv
Vendor
CVE Published:
6 September 2024

Summary

The Sirv plugin for WordPress is susceptible to a vulnerability that permits unauthorized modification of data. This occurs due to a missing capability check in the 'sirv_save_prevented_sizes' function, making all versions up to and including 7.2.7 affected. Authenticated users with Contributor-level permissions and higher can exploit the flaw in the 'sirv_upload_file_by_chunks_callback' function. This function fails to perform adequate file type validation, enabling attackers to upload arbitrary files onto the server of the affected site, thereby potentially leading to remote code execution.

Affected Version(s)

Image Optimizer, Resizer and CDN – Sirv * <= 7.2.7

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nicola Scattaglia
.