A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Home / security-advisories / Two critical vulnerabilities affecting WordPress (CVE-2024-6220, CVE-2024-6457)

Two critical vulnerabilities affecting WordPress (CVE-2024-6220, CVE-2024-6457)

Advisory No: TZCERT/SA/2024/07/19-1

Date of First Release: 19th July 2024

Source: Wordfence

Software Affected: Keydatas, woocommerce-products-filter

Overview:

WordPress is vulnerable to two (2) critical vulnerabilities. Exploitation of these vulnerabilities makes remote code execution possible.

Description:

Two (2) WordPress plugins namely Keydatas, woocommerce-products-filter are affected by the vulnerabilities tracked as CVE-2024-6220 and CVE-2024-6457 respectively. Reasons for the flaws include missing file type validation in the keydatas_downloadImages function, and insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. The attackers can exploit the vulnerabilities to execute arbitrary codes on the server and extract sensitive information from the database.

Impact:

Successful exploitation of these vulnerabilities may allow an attacker to take control of the affected system.

Solution:

WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.

References:

  1. https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/keydatas/keydatas-252-unauthenticated-arbitrary-file-upload
  2. https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-products-filter/husky-products-filter-professional-for-woocommerce-136-unauthenticated-time-based-sql-injection

Check Also

Remote Code Execution vulnerability in Spring Cloud Data Flow (CVE-2024-37084)

Advisory No: TZCERT/SA/2024/07/26-6 Date of First Release: 26th July 2024 Source: Spring Software Affected: Spring …