The Brizy – Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension validation in the validateImageContent function called via storeImages in all versions up to, and including, 2.4.43. This makes it possible for authenticated attackers, with contributor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Version 2.4.44 prevents the upload of files ending in .sh and .php. Version 2.4.45 fully patches the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Brizy brizy
|
|
CPEs | cpe:2.3:a:brizy:brizy:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Brizy brizy-page Builder
|
Brizy brizy
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T20:05:08.280Z
Reserved: 2024-04-02T20:31:51.954Z
Link: CVE-2024-3242

Updated: 2024-08-01T20:05:08.280Z

Status : Modified
Published: 2024-07-18T09:15:02.337
Modified: 2025-01-16T15:08:00.773
Link: CVE-2024-3242

No data.