Unauthenticated File Upload Vulnerability in WPGYM Plugin Could Lead to Remote Code Execution
CVE-2024-9942

9.8CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
23 November 2024

Summary

The WPGYM - WordPress Gym Management System plugin contains a significant vulnerability due to inadequate file type validation within the MJ_gmgt_user_avatar_image_upload() function. This flaw allows unauthenticated attackers to upload arbitrary files to the server hosting the affected WordPress site. Such unauthorized uploads can lead to various security threats including remote code execution, exposing websites to further attacks. All versions of the WPGYM plugin up to and including 67.1.0 are affected, necessitating immediate attention to mitigate potential risks.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.