CVE-2024-4345

CRITICAL EXPLOITED

Startklar Elementor Addons <1.7.13 - File Upload

Title source: llm
STIX 2.1

Description

The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'process' function in the 'startklarDropZoneUploadProcess' class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Scores

CVSS v3 9.8
EPSS 0.1496
EPSS Percentile 94.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

VulnCheck KEV 2024-05-06
CWE
CWE-434
Status published
Products (1)
wshberlin/Startklar Elementor Addons < 1.7.13
Published May 07, 2024
Tracked Since Feb 18, 2026