First published: Sat Mar 08 2025(Updated: )
The SMTP by BestWebSoft plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
BestWebSoft SMTP | <=1.1.9 | |
BestWebSoft SMTP | <1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13908 is classified with a high severity due to the potential for arbitrary file uploads.
To fix CVE-2024-13908, update the BestWebSoft SMTP plugin to version 1.2.0 or later.
Authenticated users with Administrator-level access on WordPress sites running versions up to 1.1.9 of the BestWebSoft SMTP plugin are affected by CVE-2024-13908.
CVE-2024-13908 allows authenticated attackers to upload arbitrary files, potentially leading to further exploitation.
CVE-2024-13908 was disclosed in the context of vulnerability reports in early 2024.