Imechapishwa: Nov 29, 2024 14:24
Advisory No: TZCERT-SA-24-0048
Source: Wordfence
Software Affected: tumult-hype-animations, widget-options, wp-jobsearch, contest-gallery, cleantalk-spam-protect, apppresser
WordPress is vulnerable to multiple critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to execute arbitrary code.
WordPress plugins tumult-hype-animations, widget-options, wp-jobsearch, contest-gallery, cleantalk-spam-protect, and apppresser are affected by the vulnerabilities tracked as CVE-2024-11082, CVE-2024-8672, CVE-2024-11925, CVE-2024-11103, CVE-2024-10542, and CVE-2024-11024 with CVSS scores of 9.9 and 9.8. The plugins are vulnerable due to missing file type validation in the hypeanimations_panel() function, user input passed through eval() without filtering, improper verification of user’s identity when verifying an email address through the user_account_activation function, improper validation of the user's identity before updating their password, authorization bypass via reverse DNS spoofing, and due to the plugin not properly validating a user's password reset code before updating their password respectively. The vulnerabilities allow attackers to takeover user accounts, obtain sensitive data, or achieve code execution on affected systems.
Successful exploitation of these vulnerabilities may allow the attackers to take control of the affected system.
WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.