Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 05 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Muffingroup
Muffingroup betheme Wordpress Wordpress wordpress |
|
| Vendors & Products |
Muffingroup
Muffingroup betheme Wordpress Wordpress wordpress |
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Betheme theme for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 28.4. This is due to the upload_icons() function workflow moving and unzipping user-controlled ZIP files into a public uploads directory without validating extracted file types. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files (including PHP) and achieve remote code execution via the Icons icon-pack upload flow. | |
| Title | Betheme <= 28.4 - Authenticated (Author+) Arbitrary File Upload to Remote Code Execution via Icon Pack Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-05T15:01:12.799Z
Reserved: 2026-04-13T23:57:52.714Z
Link: CVE-2026-6261
Updated: 2026-05-05T15:01:04.021Z
Status : Deferred
Published: 2026-05-05T12:16:21.453
Modified: 2026-05-05T19:08:20.090
Link: CVE-2026-6261
No data.
OpenCVE Enrichment
Updated: 2026-05-05T14:15:19Z