Unrestricted Upload of File with Dangerous Type (CWE-434)
The Wechat Social login plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'convert_remoteimage_to_local' function in versions up to, and including, 1.3.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
This vulnerability allows unauthenticated attackers to upload arbitrary files to the affected WordPress site's server. The potential impact is severe, as it may lead to remote code execution. Given the CVSS v3.1 base score of 9.8 (Critical), the vulnerability has high impact on confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access to sensitive information, modify or delete data, and disrupt the normal functioning of the WordPress site.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is not explicitly mentioned in the provided information. However, given that the vulnerability affects versions up to and including 1.3.0 of the Wechat Social login plugin for WordPress, it is likely that an update or patch will be released in a version newer than 1.3.0. Users should check for and apply any available updates to the plugin as soon as they become available.
1. Immediately update the Wechat Social login plugin for WordPress to a version newer than 1.3.0 if available. 2. If an update is not available, consider temporarily disabling the plugin until a patch is released. 3. Implement strong input validation and file type checking mechanisms for all file upload functionalities. 4. Regularly monitor and audit file uploads on the WordPress site. 5. Implement and maintain strong access controls and least privilege principles for all WordPress users and functionalities. 6. Use Web Application Firewalls (WAF) to help detect and block malicious file upload attempts. 7. Keep WordPress core, all themes, and other plugins up to date to minimize overall vulnerability exposure.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2024-9108. See article
Feedly estimated the CVSS score as HIGH
Detection for the vulnerability has been added to Qualys (152260)
NVD published the first details for CVE-2024-9108
A CVSS base score of 9.8 has been assigned.
EPSS Score was set to: 0.09% (Percentile: 39.7%)