Cyber Posture

CVE-2024-13908

High

Published: 08 March 2025

Published
08 March 2025
Modified
13 March 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0171 82.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may transfer tools or other files from an external system into a compromised environment.

Security Summary

CVE-2024-13908 is an arbitrary file upload vulnerability in the SMTP by BestWebSoft plugin for WordPress, stemming from missing file type validation in the 'save_options' function. It affects all versions up to and including 1.1.9. The flaw, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.

Authenticated attackers with Administrator-level access or higher can exploit this vulnerability over the network with low complexity. By leveraging the flawed 'save_options' function, they can upload arbitrary files to the affected WordPress site's server, potentially enabling remote code execution depending on server configuration and file types like web shells.

Mitigation details are outlined in plugin advisories and patches referenced in Wordfence's threat intelligence and WordPress plugin trac repositories. A fix appears in changeset 3250935, with code changes visible in the 1.1.8 tag of class-bwssmtp-settings.php, recommending immediate updates to versions beyond 1.1.9 for affected sites.

Details

CWE(s)
CWE-434

Affected Products

bestwebsoft
smtp
≤ 1.2.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Arbitrary file upload vuln in public-facing WordPress plugin directly enables exploitation of the application (T1190) and facilitates ingress of malicious files like web shells (T1105, T1505.003) for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References