Unrestricted Upload of File with Dangerous Type (CWE-434)
The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This vulnerability allows unauthenticated attackers to upload arbitrary files on the affected site's server, potentially enabling remote code execution.
This vulnerability has a severe impact on affected WordPress sites. Unauthenticated attackers can exploit this flaw to upload malicious files to the server, potentially leading to remote code execution. This could result in complete compromise of the affected WordPress site, including unauthorized access to sensitive data, modification of website content, and potential use of the server for further malicious activities. The high severity is reflected in the CVSS v3.1 base score of 9.8, indicating critical impact on confidentiality, integrity, and availability of the affected system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
As of the latest information provided, there is no mention of an available patch. The vulnerability affects Wux Blog Editor plugin versions up to and including 3.0.0. Website administrators should monitor for updates from the plugin developer and apply any security patches as soon as they become available.
Until a patch is available, the following mitigation steps are recommended: 1. Disable or uninstall the Wux Blog Editor plugin if it's not critical for operations. 2. If the plugin must be used, implement strict access controls to limit who can access the plugin's functionality. 3. Use Web Application Firewall (WAF) rules to block potentially malicious file uploads. 4. Monitor server logs for any suspicious file upload attempts or unexpected file types. 5. Regularly backup your WordPress site and keep backups isolated from the live environment. 6. Consider using file integrity monitoring tools to detect any unauthorized changes to your WordPress installation. 7. Keep WordPress core, all themes, and other plugins up-to-date to reduce overall attack surface.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2024-9932. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-9932
A CVSS base score of 9.8 has been assigned.
EPSS Score was set to: 0.09% (Percentile: 39.9%)