Cyber Posture

CVE-2024-10960

Critical

Published: 12 February 2025

Published
12 February 2025
Modified
20 February 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0395 88.4th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Description

The Brizy – Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'storeUploads' function in all versions up to, and including, 2.6.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Security Summary

CVE-2024-10960 is an arbitrary file upload vulnerability in the Brizy – Page Builder plugin for WordPress, stemming from missing file type validation in the 'storeUploads' function. It affects all versions up to and including 2.6.4. The flaw, associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high-impact confidentiality, integrity, and availability effects.

Authenticated attackers with Contributor-level access or higher can exploit this vulnerability to upload arbitrary files to the affected WordPress site's server. Successful exploitation may enable remote code execution, allowing attackers to execute malicious code in the context of the web server process.

References point to mitigation via an update to Brizy version 2.6.5, as evidenced by the WordPress plugin trac changeset addressing the issue in the editor/zip/archiver.php file. The Wordfence threat intelligence advisory provides further details on the vulnerability. Security practitioners should urge site owners to update the plugin immediately and review access controls for Contributor roles.

Details

CWE(s)
CWE-434

Affected Products

brizy
brizy
≤ 2.6.5

References