Two critical vulnerabilities affecting WordPress (CVE-2024-6220, CVE-2024-6457)

Published On: Aug 16, 2024 18:17

Advisory No: TZCERT-SA-24-0006

Source: Keydatas, woocommerce-products-filter

Software Affected: Keydatas, woocommerce-products-filter

Overview

WordPress is vulnerable to two (2) critical vulnerabilities. Exploitation of these vulnerabilities makes remote code execution possible.

Description

Two (2) WordPress plugins namely Keydatas, woocommerce-products-filter are affected by the vulnerabilities tracked as CVE-2024-6220 and CVE-2024-6457 respectively. Reasons for the flaws include missing file type validation in the keydatas_downloadImages function, and insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. The attackers can exploit the vulnerabilities to execute arbitrary codes on the server and extract sensitive information from the database.

Impact

Successful exploitation of these vulnerabilities may allow an attacker to take control of the affected system.

Solution

WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Report Incident