First published: Sat Nov 09 2024(Updated: )
The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Debug Tool | <=2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10586 is rated as a medium severity vulnerability due to the risk of arbitrary file creation by unauthenticated attackers.
To fix CVE-2024-10586, update the Debug Tool plugin to version 2.3 or later which addresses the vulnerability.
CVE-2024-10586 affects all versions of the WordPress Debug Tool plugin up to and including version 2.2.
The exploit method for CVE-2024-10586 involves missing capability checks and file type validation, allowing arbitrary file creation.
Yes, CVE-2024-10586 is considered easy to exploit as it can be executed by unauthenticated users.