CVE-2024-6220

CRITICAL EXPLOITED NUCLEI

Keydatas plugin <2.5.2 - RCE

Title source: llm

Description

The 简数采集器 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Nuclei Templates (1)

WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload
CRITICALVERIFIEDby hnd3884

Scores

CVSS v3 9.8
EPSS 0.7168
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-07-17
CWE
CWE-434
Status published
Products (2)
keydatas/keydatas < 2.5.2
zhengdon/简数采集器 < 2.5.2
Published Jul 17, 2024
Tracked Since Feb 18, 2026