Vulnerability Details : CVE-2021-24490
Potential exploit
The Email Artillery (MASS EMAIL) WordPress plugin through 4.1 does not properly check the uploaded files from the Import Emails feature, allowing arbitrary files to be uploaded. Furthermore, the plugin is also lacking any CSRF check, allowing such issue to be exploited via a CSRF attack as well. However, due to the presence of a .htaccess, denying access to everything in the folder the file is uploaded to, the malicious uploaded file will only be accessible on Web Servers such as Nginx/IIS
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2021-24490
- cpe:2.3:a:email_artillery_project:email_artillery:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-24490
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-24490
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST | |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
NIST |
CWE ids for CVE-2021-24490
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: contact@wpscan.com (Primary)
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: contact@wpscan.com (Primary)
References for CVE-2021-24490
-
https://wpscan.com/vulnerability/4ea0127e-afef-41bf-a005-c57432f9f58c
Attention Required! | CloudflareExploit;Third Party Advisory
Jump to