First published: Tue Nov 12 2024(Updated: )
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with editor-level access and above, to delete limited files on the server.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeisle Multiple Page Generator Plugin - MPG | <4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10672 is considered to have a medium severity level due to the potential for unauthorized file deletion.
To fix CVE-2024-10672, update the Multiple Page Generator Plugin to version 4.0.3 or later, which addresses the vulnerability.
All users of the Multiple Page Generator Plugin for WordPress running versions up to and including 4.0.2 are affected by CVE-2024-10672.
CVE-2024-10672 is an arbitrary file deletion vulnerability caused by insufficient file path validation.
The vulnerability in CVE-2024-10672 is related to the mpg_upsert_project_source_block() function within the plugin.