{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-50526","assignerOrgId":"21595511-bba5-4825-b968-b78d1f9984a3","state":"PUBLISHED","assignerShortName":"Patchstack","dateReserved":"2024-10-24T07:27:19.970Z","datePublished":"2024-11-04T13:43:37.812Z","dateUpdated":"2026-04-01T15:37:09.044Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://wordpress.org/plugins","defaultStatus":"unaffected","packageName":"multi-purpose-mail-form","product":"Multi Purpose Mail Form","vendor":"Lindeni Mahlalela","versions":[{"lessThanOrEqual":"1.0.2","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"stealthcopter | Patchstack Bug Bounty Program"}],"datePublic":"2026-04-01T16:28:54.779Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Unrestricted Upload of File with Dangerous Type vulnerability in Lindeni Mahlalela Multi Purpose Mail Form multi-purpose-mail-form allows Upload a Web Shell to a Web Server.<p>This issue affects Multi Purpose Mail Form: from n/a through <= 1.0.2.</p>"}],"value":"Unrestricted Upload of File with Dangerous Type vulnerability in Lindeni Mahlalela Multi Purpose Mail Form multi-purpose-mail-form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through <= 1.0.2."}],"impacts":[{"capecId":"CAPEC-650","descriptions":[{"lang":"en","value":"Upload a Web Shell to a Web Server"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"21595511-bba5-4825-b968-b78d1f9984a3","shortName":"Patchstack","dateUpdated":"2026-04-01T15:37:09.044Z"},"references":[{"tags":["vdb-entry"],"url":"https://patchstack.com/database/Wordpress/Plugin/multi-purpose-mail-form/vulnerability/wordpress-multi-purpose-mail-form-plugin-1-0-2-arbitrary-file-upload-vulnerability-2?_s_id=cve"}],"title":"WordPress Multi Purpose Mail Form plugin <= 1.0.2 - Arbitrary File Upload vulnerability"},"adp":[{"affected":[{"vendor":"mahlamusa","product":"multi_purpose_mail_form","cpes":["cpe:2.3:a:mahlamusa:multi_purpose_mail_form:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"1.0.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-04T15:35:47.374359Z","id":"CVE-2024-50526","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-04T15:36:44.050Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-01-23T15:15:40.220Z"},"references":[{"url":"https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}