First published: Wed Jan 08 2025(Updated: )
The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files that can lead to remote code execution.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webinarpress | <1.33.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11270 has a medium severity level, primarily due to potential unauthorized file creation.
To fix CVE-2024-11270, update the WebinarPress plugin to version 1.33.25 or above.
CVE-2024-11270 affects all versions of the WebinarPress plugin up to and including 1.33.24.
CVE-2024-11270 is a vulnerability that allows for arbitrary file creation due to a missing capability check.
The consequences of CVE-2024-11270 include potential unauthorized access to the server through file creation.