CVE-2024-13418

Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:g5plus:april:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:g5plus:auteur:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:g5plus:benaa:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:g5plus:beyot:*:*:*:*:*:wordpress:*:*

History

06 May 2025, 15:25

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-02 04:15

Updated : 2025-05-06 15:25


NVD link : CVE-2024-13418

Mitre link : CVE-2024-13418

CVE.ORG link : CVE-2024-13418


JSON object : View

Products Affected

g5plus

  • april
  • benaa
  • beyot
  • auteur
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type