SB2021082406 - Multiple vulnerabilities in WP Upload Restriction plugin for WordPress
Published: August 24, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2021-34627)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the "getSelectedMimeTypesByRole" function. A remote authenticated attacker can bypass implemented security restrictions and retrieve approved mime types for any given role.
2) Improper access control (CVE-ID: CVE-2021-34626)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the "deleteCustomType" function. A remote authenticated attacker can bypass implemented security restrictions and delete custom extensions.
3) Stored cross-site scripting (CVE-ID: CVE-2021-34625)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "saveCustomType" function. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.