CVE-2026-2942
Published: 08 April 2026
Description
The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers to upload…
more
arbitrary files on the affected site's server which may make remote code execution possible.
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and correction of flaws like the arbitrary file upload vulnerability in the ProSolution WP Client plugin via patching.
Mandates validation of information inputs such as file types and content during uploads, directly countering the missing file type validation in the proSol_fileUploadProcess function.
Deploys malicious code protection at system entry points to scan and block dangerous uploaded files, mitigating potential remote code execution.
Security SummaryAI
CVE-2026-2942 is an arbitrary file upload vulnerability in the ProSolution WP Client plugin for WordPress, affecting all versions up to and including 1.9.9. The flaw arises from missing file type validation in the 'proSol_fileUploadProcess' function, allowing attackers to upload arbitrary files to the affected site's server. Published on 2026-04-08, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type).
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction or privileges required. By leveraging the flawed upload function, they can place malicious files on the server, which may lead to remote code execution depending on server configuration and file handling.
Advisories from Wordfence and the WordPress plugins trac repository provide mitigation details, including a patch in changeset 3484577 for the prosolution-wp-client plugin. The vulnerable code is visible in the public class file at line 993 (revision 3331282), and security practitioners should update to the patched version to address the issue.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated arbitrary file upload in a public-facing WordPress plugin enables T1190 (Exploit Public-Facing Application) for initial access and facilitates T1505.003 (Web Shell) via uploading malicious files for remote code execution.