CVE-2024-7620

The Customizer Export/Import plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the '_import' function in all versions up to, and including, 0.9.7. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: This vulnerability is only exploitable when used in conjunction with a race condition as the uploaded file is deleted shortly after it is created.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fastlinemedia:customizer_export\/import:*:*:*:*:*:wordpress:*:*

History

10 Jul 2025, 15:26

Type Values Removed Values Added
CPE cpe:2.3:a:fastlinemedia:customizer_export\/import:*:*:*:*:*:wordpress:*:*
First Time Fastlinemedia customizer Export\/import
Fastlinemedia
References () https://plugins.trac.wordpress.org/changeset/3144365/customizer-export-import - () https://plugins.trac.wordpress.org/changeset/3144365/customizer-export-import - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/7600e7df-725d-4877-b0bf-5329f814723f?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/7600e7df-725d-4877-b0bf-5329f814723f?source=cve - Third Party Advisory

Information

Published : 2024-09-07 12:15

Updated : 2025-07-10 15:26


NVD link : CVE-2024-7620

Mitre link : CVE-2024-7620

CVE.ORG link : CVE-2024-7620


JSON object : View

Products Affected

fastlinemedia

  • customizer_export\/import
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type