Unauthenticated File Upload Vulnerability in WPGYM Plugin Could Lead to Remote Code Execution
CVE-2024-9942
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 23 November 2024
Summary
The WPGYM - WordPress Gym Management System plugin contains a significant vulnerability due to inadequate file type validation within the MJ_gmgt_user_avatar_image_upload() function. This flaw allows unauthenticated attackers to upload arbitrary files to the server hosting the affected WordPress site. Such unauthorized uploads can lead to various security threats including remote code execution, exposing websites to further attacks. All versions of the WPGYM plugin up to and including 67.1.0 are affected, necessitating immediate attention to mitigate potential risks.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published