Published On: Feb 14, 2025 11:44
Advisory No: TZCERT-SA-25-0057
Source: Wordfence
Software Affected: brizy, campress, wp-directorybox-manager, security-malware-firewall, wp-foodbakery, nextend-social-login-pro
WordPress plugins are vulnerable to critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to execute arbitrary code.
WordPress plugins brizy, campress, wp-directorybox-manager, security-malware-firewall, wp-foodbakery, and nextend-social-login-pro are affected by the vulnerabilities tracked as CVE-2024-10960, CVE-2024-10763, CVE-2024-13182, CVE-2024-13365, CVE-2025-0180, and CVE-2025-1061 with a CVSS score between 9.9 and 9.8. The plugins are vulnerable due to missing file type validation in the 'storeUploads' function, Local File Inclusion via the 'campress_woocommerce_get_ajax_products' function, incorrect authentication in the 'wp_dp_parse_request' function, plugin’s uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function, plugin not properly restricting what user meta can be updated during profile registration and insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. The vulnerabilities allow unauthenticated attackers to bypass access controls, obtain sensitive data, or achieve code execution.
Successful exploitation of these vulnerabilities may allow the attackers to gain escalated privileges on the affected system.
WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.