First published: Fri Dec 15 2023(Updated: )
The E2Pdf plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'import_action' function in versions up to, and including, 1.20.25. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
E2pdf | <=1.20.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6826 is rated as a high severity vulnerability due to its potential for arbitrary file uploads.
To fix CVE-2023-6826, update the E2Pdf plugin to version 1.20.26 or later.
CVE-2023-6826 affects users of the E2Pdf plugin for WordPress prior to version 1.20.26.
Authenticated attackers can exploit CVE-2023-6826 to upload arbitrary files to the server.
E2Pdf versions up to and including 1.20.25 are vulnerable to CVE-2023-6826.