{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-13418","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2025-01-15T18:30:23.100Z","datePublished":"2025-05-02T03:21:20.383Z","dateUpdated":"2026-04-08T17:18:50.724Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T17:18:50.724Z"},"affected":[{"vendor":"G5Theme","product":"Benaa Framework","versions":[{"version":"0","status":"affected","lessThanOrEqual":"4.0.0","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"G5Theme","product":"April Framework","versions":[{"version":"0","status":"affected","lessThanOrEqual":"5.1","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"G5Theme","product":"Beyot Framework","versions":[{"version":"0","status":"affected","lessThanOrEqual":"6.0.6","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"G5Theme","product":"Auteur Framework","versions":[{"version":"0","status":"affected","lessThanOrEqual":"7.1","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Multiple plugins and/or themes for WordPress are vulnerable to Arbitrary File Uploads due to a missing capability check on the ajaxUploadFonts() function in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files that can make remote code execution possible. This issue was escalated to Envato over two months from the date of this disclosure and the issue, while partially patched, is still vulnerable."}],"title":"Smart Framework <= Multiple Plugins - Authenticated (Subscriber+) Arbitrary File Upload","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/bced4547-3264-43dc-8bb1-89a06f74ccbd?source=cve"},{"url":"https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","cweId":"CWE-434","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}],"credits":[{"lang":"en","type":"finder","value":"Lucio Sá"}],"timeline":[{"time":"2025-05-01T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-02T14:43:44.262525Z","id":"CVE-2024-13418","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-02T14:47:00.176Z"}}]}}