Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Denishua
Denishua wpjam Basic Wordpress Wordpress wordpress |
|
| Vendors & Products |
Denishua
Denishua wpjam Basic Wordpress Wordpress wordpress |
Wed, 25 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM Basic wpjam-basic allows Using Malicious Files.This issue affects WPJAM Basic: from n/a through <= 6.9.2. | |
| Title | WordPress WPJAM Basic plugin <= 6.9.2 - Arbitrary File Upload vulnerability | |
| Weaknesses | CWE-434 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-04-29T09:52:01.251Z
Reserved: 2026-03-12T11:12:19.946Z
Link: CVE-2026-32523
Updated: 2026-03-26T13:20:46.412Z
Status : Deferred
Published: 2026-03-25T17:17:05.237
Modified: 2026-04-24T16:35:20.070
Link: CVE-2026-32523
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:30:44Z