
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-6316 affects the MW WP Form plugin for WordPress, versions up to and including 5.0.1. The vulnerability was discovered by Wordfence's Threat Intelligence team on November 24, 2023, and was patched in version 5.0.2. This critical vulnerability (CVSS score 9.8) allows unauthenticated attackers to upload arbitrary files to affected WordPress sites due to insufficient file type validation in the '_single_file_upload' function (Wordfence Blog, WPScan).
The vulnerability stems from a flaw in the file type validation process within the '_single_file_upload' function. While the file type check function correctly identifies dangerous file types, it throws a runtime exception in the try block that is caught by the catch block. The catch block only logs the error using error_log() without stopping the upload process, allowing dangerous files to be uploaded despite being detected (Security Online).
The vulnerability enables attackers to upload arbitrary files, including malicious PHP files, to the affected site's server. Once uploaded, these files can be accessed and executed on the server, potentially leading to remote code execution, unauthorized access, data theft, and complete site compromise (Security Online).
The vulnerability has been patched in version 5.0.2 of the MW WP Form plugin. Users are strongly advised to update to this latest version immediately to protect their websites from potential attacks. The patch was released on November 29, 2023, following the responsible disclosure process (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."