Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4805 | The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_recordMedia' function in all versions up to, and including, 2.9.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary files on the server. |
Fri, 21 Feb 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Undsgn
Undsgn uncode |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Undsgn
Undsgn uncode |
Tue, 18 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Feb 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_recordMedia' function in all versions up to, and including, 2.9.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary files on the server. | |
| Title | Uncode <= 2.9.1.6 - Authenticated (Subscriber+) Arbitrary File Read in uncode_recordMedia | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:26:10.412Z
Reserved: 2025-01-23T19:22:58.928Z
Link: CVE-2024-13691
Updated: 2025-02-18T14:17:25.416Z
Status : Analyzed
Published: 2025-02-18T11:15:11.430
Modified: 2025-02-21T14:22:06.687
Link: CVE-2024-13691
No data.
OpenCVE Enrichment
No data.
EUVD