CVE-2024-10629

HIGH

GPX Viewer <2.2.8 - Code Injection

Title source: llm

Description

The GPX Viewer plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check and file type validation in the gpxv_file_upload() function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files on the affected site's server which may make remote code execution possible.

Exploits (3)

nomisec WORKING POC
by Nxploited · poc
https://github.com/Nxploited/CVE-2024-10629
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-10629
nomisec WORKING POC
by RandomRobbieBF · poc
https://github.com/RandomRobbieBF/CVE-2024-10629

Scores

CVSS v3 8.8
EPSS 0.5272
EPSS Percentile 97.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-862
Status draft

Timeline

Published Nov 13, 2024
Tracked Since Feb 18, 2026