First published: Thu May 23 2024(Updated: )
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hash Hash Form – Drag & Drop Form Builder | <=1.1.0 | |
Hashthemes Hash Form | <1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5084 has a high severity due to its potential for arbitrary file uploads by unauthenticated attackers.
To fix CVE-2024-5084, update the Hash Form – Drag & Drop Form Builder plugin to version 1.1.1 or later.
CVE-2024-5084 affects all versions of the Hash Form – Drag & Drop Form Builder plugin up to and including version 1.1.0.
Using CVE-2024-5084, attackers can upload arbitrary files, potentially leading to further exploitation of the vulnerable site.
No, CVE-2024-5084 can be exploited by unauthenticated users, making it particularly dangerous.