CVE-2024-7384 : ACYBA ACYMAILING PLUGIN UP TO 9.7.2 ON WORDPRESS ACYM_EXTRACTARCHIVE UNRESTRICTED UPLOAD

Description

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the acym_extractArchive function in all versions up to, and including, 9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible.

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/0c747bc9-582c-4b9f-85a4-469c446d50f5?source=cve

https://plugins.trac.wordpress.org/browser/acymailing/trunk/back/libraries/wordpress/file.php#L47

https://wordpress.org/plugins/acymailing/#developers

https://www.acymailing.com/changelog/

https://plugins.trac.wordpress.org/changeset?old_path=%2Facymailing&old=3118953&new_path=%2Facymailing&new=3137644&sfp_email=&sfph_mail=

https://plugins.trac.wordpress.org/changeset/3137644/

For More Information

CVERecord

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-45663 : IBM DB2/DB2 CONNECT SERVER 11.1/11.5 QUERY DENIAL OF SERVICE

CVE-2024-45663 : IBM DB2/DB2 CONNECT SERVER 11.1/11.5 QUERY DENIAL OF SERVICE

Description IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 is vulnerable to a denial

CVE-2024-52739 : D-LINK DI-8400 16.07.26A1 MSP_INFO_HTM CMD PRIVILEGE ESCALATION

CVE-2024-52739 : D-LINK DI-8400 16.07.26A1 MSP_INFO_HTM CMD PRIVILEGE ESCALATION

Description D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the

CVE-2024-52769 : DEDEBIZ 6.3.0 FILE /ADMIN/FRIENDLINK_EDIT UNRESTRICTED UPLOAD

CVE-2024-52769 : DEDEBIZ 6.3.0 FILE /ADMIN/FRIENDLINK_EDIT UNRESTRICTED UPLOAD

Description An arbitrary file upload vulnerability in the component /admin/friendlink_edit of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via