
Cloud Vulnerability DB
A community-led vulnerabilities database
The Advanced AJAX Page Loader plugin for WordPress contains a Cross-Site Request Forgery vulnerability that enables Arbitrary File Upload in versions up to and including 2.7.7. The vulnerability exists due to missing nonce validation in the 'admininitAAPL' function and missing file type validation in the 'AAPLoptionsvalidate' function (NVD).
The vulnerability stems from two key security issues: 1) The absence of nonce validation in the 'admininitAAPL' function, and 2) Missing file type validation in the 'AAPLoptionsvalidate' function. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 HIGH with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
This vulnerability allows unauthenticated attackers to upload arbitrary files to the affected site's server. If successfully exploited, this could lead to remote code execution if an attacker can trick a site administrator into performing specific actions, such as clicking on a malicious link (NVD).
Users should update to a version newer than 2.7.7 if available. If an immediate update is not possible, it is recommended to disable the Advanced AJAX Page Loader plugin until a patched version can be installed (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."