CVE-2024-1468

The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*

History

05 Feb 2025, 18:12

Type Values Removed Values Added
First Time Theme-fusion
Theme-fusion avada
References () https://avada.com/documentation/avada-changelog/ - () https://avada.com/documentation/avada-changelog/ - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve - Third Party Advisory
CPE cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*
CWE CWE-434

Information

Published : 2024-02-29 04:15

Updated : 2025-02-05 18:12


NVD link : CVE-2024-1468

Mitre link : CVE-2024-1468

CVE.ORG link : CVE-2024-1468


JSON object : View

Products Affected

theme-fusion

  • avada
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type