Vulnerability Description
The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versions up to, and including, 7.2.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sirv | Sirv | < 7.2.7 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3103410/sirv/trunk/sirv.phpPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e89b40ec-1952-46e3-a91Third Party Advisory
- https://plugins.trac.wordpress.org/changeset/3103410/sirv/trunk/sirv.phpPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e89b40ec-1952-46e3-a91Third Party Advisory
FAQ
What is CVE-2024-5853?
CVE-2024-5853 is a vulnerability with a CVSS score of 9.9 (CRITICAL). The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versio...
How severe is CVE-2024-5853?
CVE-2024-5853 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-5853?
Check the references section above for vendor advisories and patch information. Affected products include: Sirv Sirv.