CVE-2024-6220
CRITICAL EXPLOITED NUCLEIKeydatas plugin <2.5.2 - RCE
Title source: llmDescription
The 简数采集器 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Nuclei Templates (1)
WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload
CRITICALVERIFIEDby hnd3884
Scores
CVSS v3
9.8
EPSS
0.7168
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-07-17
CWE
CWE-434
Status
published
Products (2)
keydatas/keydatas
< 2.5.2
zhengdon/简数采集器
< 2.5.2
Published
Jul 17, 2024
Tracked Since
Feb 18, 2026