Vulnerability Description
The WP ULike Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the WP_Ulike_Pro_File_Uploader class in all versions up to, and including, 1.9.3. This makes it possible for unauthenticated attackers to upload limited arbitrary files like .php2, .php6, .php7, .phps, .pht, .phtm, .pgif, .shtml, .phar, .inc, .hphp, .ctp, .module, .html, .svg on the affected site's server which may make make other attacks like Cross-Site Scripting possible. Only versions up to 1.8.7 were confirmed vulnerable, however, the earliest tested version for a patch we have access to is 1.9.4, so we are considering 1.9.4 the patched version.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://wpulike.com/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9b86d9ea-b842-4492-82e
FAQ
What is CVE-2024-9648?
CVE-2024-9648 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The WP ULike Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the WP_Ulike_Pro_File_Uploader class in all versions up to, and including, 1.9...
How severe is CVE-2024-9648?
CVE-2024-9648 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9648?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.