9.8
CVSSv3

CVE-2024-5084

Published: 23/05/2024 Updated: 24/05/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated malicious users to upload arbitrary files on the affected site's server which may make remote code execution possible.

Vulnerability Trend

Github Repositories

Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution

πŸš€ HashForm Exploit Script This script demonstrates the exploitation of CVE-2024-5084, a vulnerability in the Hash Form plugin for WordPress, which allows unauthenticated arbitrary file upload leading to remote code execution πŸ“– Vulnerability Details Name: CVE-2024-5084 Description: Unauthenticated Arbitrary File Upload to Remote Code Execution Affected Plugin: Hash Form

Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution

Hash Form – Drag &amp; Drop Form Builder &lt;= 110 - Unauthenticated Arbitrary File Upload to Remote Code Execution CVE-2024-5084 The Hash Form – Drag &amp; Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and includin