First published: Fri May 02 2025(Updated: )
Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envato WordPress Plugins/Themes | <=Multiple Plugins | |
Envato Smart Framework | <=Multiple Plugins |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13418 is classified as a high severity vulnerability due to the potential for unauthorized file uploads.
To mitigate CVE-2024-13418, ensure that proper capability checks are implemented in the ajaxUploadFonts() function.
CVE-2024-13418 affects multiple WordPress plugins and themes that allow authenticated users with Subscriber-level access to upload files.
CVE-2024-13418 can enable attackers to upload arbitrary files, which may lead to remote code execution or data breaches.
CVE-2024-13418 impacts various versions of multiple Envato WordPress plugins and themes that lack capability checks.