Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54195 | The SMTP by BestWebSoft plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. |
Thu, 13 Mar 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bestwebsoft
Bestwebsoft smtp |
|
| CPEs | cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Bestwebsoft
Bestwebsoft smtp |
Tue, 11 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 08 Mar 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The SMTP by BestWebSoft plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
| Title | SMTP by BestWebSoft <= 1.1.9 - Authenticated (Administrator+) Arbitrary File Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:11:55.689Z
Reserved: 2025-02-24T23:12:54.995Z
Link: CVE-2024-13908
Updated: 2025-03-10T16:59:59.289Z
Status : Analyzed
Published: 2025-03-08T07:15:10.690
Modified: 2025-03-13T13:07:55.160
Link: CVE-2024-13908
No data.
OpenCVE Enrichment
No data.
EUVD