Cyber Posture

CVE-2026-2942

Critical

Published: 08 April 2026

Published
08 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0017 37.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers to upload…

more

arbitrary files on the affected site's server which may make remote code execution possible.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and correction of flaws like the arbitrary file upload vulnerability in the ProSolution WP Client plugin via patching.

prevent

Mandates validation of information inputs such as file types and content during uploads, directly countering the missing file type validation in the proSol_fileUploadProcess function.

preventdetect

Deploys malicious code protection at system entry points to scan and block dangerous uploaded files, mitigating potential remote code execution.

Security SummaryAI

CVE-2026-2942 is an arbitrary file upload vulnerability in the ProSolution WP Client plugin for WordPress, affecting all versions up to and including 1.9.9. The flaw arises from missing file type validation in the 'proSol_fileUploadProcess' function, allowing attackers to upload arbitrary files to the affected site's server. Published on 2026-04-08, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type).

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction or privileges required. By leveraging the flawed upload function, they can place malicious files on the server, which may lead to remote code execution depending on server configuration and file handling.

Advisories from Wordfence and the WordPress plugins trac repository provide mitigation details, including a patch in changeset 3484577 for the prosolution-wp-client plugin. The vulnerable code is visible in the public class file at line 993 (revision 3331282), and security practitioners should update to the patched version to address the issue.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unauthenticated arbitrary file upload in a public-facing WordPress plugin enables T1190 (Exploit Public-Facing Application) for initial access and facilitates T1505.003 (Web Shell) via uploading malicious files for remote code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References