Published On: Aug 16, 2024 18:17
Advisory No: TZCERT-SA-24-0006
Source: Keydatas, woocommerce-products-filter
Software Affected: Keydatas, woocommerce-products-filter
WordPress is vulnerable to two (2) critical vulnerabilities. Exploitation of these vulnerabilities makes remote code execution possible.
Two (2) WordPress plugins namely Keydatas, woocommerce-products-filter are affected by the vulnerabilities tracked as CVE-2024-6220 and CVE-2024-6457 respectively. Reasons for the flaws include missing file type validation in the keydatas_downloadImages function, and insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. The attackers can exploit the vulnerabilities to execute arbitrary codes on the server and extract sensitive information from the database.
Successful exploitation of these vulnerabilities may allow an attacker to take control of the affected system.
WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.