High severity8.8NVD Advisory· Published Jul 18, 2024· Updated Apr 8, 2026
CVE-2024-3242
CVE-2024-3242
Description
The Brizy – Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension validation in the validateImageContent function called via storeImages in all versions up to, and including, 2.4.43. This makes it possible for authenticated attackers, with contributor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Version 2.4.44 prevents the upload of files ending in .sh and .php. Version 2.4.45 fully patches the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.phpnvdPatch
- plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.phpnvdPatch
- plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.phpnvdPatch
- plugins.trac.wordpress.org/changeset/3112878/brizy/trunknvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835nvdThird Party Advisory
News mentions
0No linked articles in our index yet.