First published: Fri Mar 29 2024(Updated: )
Unrestricted Upload of File with Dangerous Type vulnerability in CubeWP CubeWP – All-in-One Dynamic Content Framework.This issue affects CubeWP – All-in-One Dynamic Content Framework: from n/a through 1.1.12.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <1.1.13 | |
CubeWP All-in-One Dynamic Content Framework | <=1.1.12 | |
CubeWP | <=1.1.12 |
Update to 1.1.13 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30500 is classified as a high severity vulnerability due to its potential for unrestricted file uploads.
To mitigate CVE-2024-30500, upgrade CubeWP – All-in-One Dynamic Content Framework to version 1.1.13 or later.
CVE-2024-30500 affects CubeWP – All-in-One Dynamic Content Framework versions up to and including 1.1.12.
Yes, CVE-2024-30500 can be exploited remotely as it allows attackers to upload dangerous file types.
The risks associated with CVE-2024-30500 include unauthorized file uploads which can lead to code execution and server compromise.