{"uuid": "e01baab5-d670-40d6-8a22-dc7a89ed00c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13418", "type": "seen", "source": "https://t.me/cvedetector/24321", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13418 - WordPress Theme/Plugin Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13418 \nPublished : May 2, 2025, 4:15 a.m. | 33\u00a0minutes ago \nDescription : Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T07:34:48.000000Z"}