CVE-2024-11082
Tumult Hype Animations <= 1.9.15 - Authenticated (Author+) Arbitrary File Upload via hypeanimations_panel Function
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Tumult Hype Animations plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the hypeanimations_panel() function in all versions up to, and including, 1.9.15. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
El complemento Tumult Hype Animations para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validación del tipo de archivo en la función hypeanimations_panel() en todas las versiones hasta la 1.9.15 incluida. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-11-11 CVE Reserved
- 2024-11-27 CVE Published
- 2024-11-29 CVE Updated
- 2024-11-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (5)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tumultinc Search vendor "Tumultinc" | Tumult Hype Animations Search vendor "Tumultinc" for product "Tumult Hype Animations" | <= 1.9.15 Search vendor "Tumultinc" for product "Tumult Hype Animations" and version " <= 1.9.15" | en |
Affected
|