Authenticated Attackers Can Exploit Plugin Vulnerability to Execute Remote Code
CVE-2024-8480
8.8HIGH
Key Information
- Vendor
- Sirv
- Status
- Image Optimizer, Resizer And Cdn – Sirv
- Vendor
- CVE Published:
- 6 September 2024
Summary
The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'sirv_save_prevented_sizes' function in all versions up to, and including, 7.2.7. This makes it possible for authenticated attackers, with Contributor-level access and above, to exploit the 'sirv_upload_file_by_chunks_callback' function, which lacks proper file type validation, allowing attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Affected Version(s)
Image Optimizer, Resizer and CDN – Sirv <= 7.2.7
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
Disclosed
Collectors
NVD DatabaseMitre Database
Credit
Nicola Scattaglia