Critical severity9.9NVD Advisory· Published Jul 13, 2023· Updated Apr 8, 2026
CVE-2023-3342
CVE-2023-3342
Description
The User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to a hardcoded encryption key and missing file type validation on the 'ur_upload_profile_pic' function in versions up to, and including, 3.0.2. This makes it possible for authenticated attackers with subscriber-level capabilities or above to upload arbitrary files on the affected site's server which may make remote code execution possible. This was partially patched in version 3.0.2 and fully patched in version 3.0.2.1.
Affected products
1- cpe:2.3:a:wpeverest:user_registration:*:*:*:*:*:wordpress:*:*Range: <3.0.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/user-registration/tags/3.0.1/includes/functions-ur-core.phpnvdPatch
- plugins.trac.wordpress.org/changeset/2933689/user-registration/trunk/includes/functions-ur-core.phpnvdPatch
- lana.codes/lanavdb/c0a58dff-7a5b-4cc0-82d6-2255e61d801c/nvdExploitThird Party Advisory
- packetstormsecurity.com/files/173434/WordPress-User-Registration-3.0.2-Arbitrary-File-Upload.htmlnvdThird Party AdvisoryVDB Entry
- www.wordfence.com/threat-intel/vulnerabilities/id/a979e885-f7dd-4616-a881-64f3d97c309dnvdThird Party Advisory
News mentions
0No linked articles in our index yet.