{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-24370","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","dateUpdated":"2024-08-03T19:28:23.807Z","dateReserved":"2021-01-14T00:00:00.000Z","datePublished":"2021-06-21T00:00:00.000Z"},"containers":{"cna":{"title":"Fancy Product Designer < 4.6.9 - Unauthenticated Arbitrary File Upload and RCE","providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-10-18T00:21:37.225Z"},"descriptions":[{"lang":"en","value":"The Fancy Product Designer WordPress plugin before 4.6.9 allows unauthenticated attackers to upload arbitrary files, resulting in remote code execution."}],"affected":[{"vendor":"Unknown","product":"Fancy Product Designer","versions":[{"version":"4.6.9","status":"affected","lessThan":"4.6.9","versionType":"custom"}]}],"references":[{"url":"https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38"},{"url":"https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/"},{"url":"https://lists.openwall.net/full-disclosure/2020/11/17/2"},{"url":"https://seclists.org/fulldisclosure/2020/Nov/30"},{"url":"https://www.secpod.com/blog/critical-zero-day-flaw-actively-exploited-in-wordpress-fancy-product-designer-plugin/"}],"credits":[{"lang":"en","value":"Charles Sweethill/Ram Gall"}],"problemTypes":[{"descriptions":[{"type":"CWE","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","cweId":"CWE-434","lang":"en"}]}],"x_generator":"WPScan CVE Generator","source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:28:23.807Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38","tags":["x_transferred"]},{"url":"https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/","tags":["x_transferred"]},{"url":"https://lists.openwall.net/full-disclosure/2020/11/17/2","tags":["x_transferred"]},{"url":"https://seclists.org/fulldisclosure/2020/Nov/30","tags":["x_transferred"]},{"url":"https://www.secpod.com/blog/critical-zero-day-flaw-actively-exploited-in-wordpress-fancy-product-designer-plugin/","tags":["x_transferred"]}]}]}}