Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-39352
PUBLISHED
More InfoOfficial Page
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
View Known Exploited Vulnerability (KEV) details
Published At-21 Oct, 2021 | 19:38
Updated At-14 Feb, 2025 | 17:54
Rejected At-
▼CVE Numbering Authority (CNA)
Catch Themes Demo Import <= 1.7 Admin+ Arbitrary File Upload

The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to and including 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.

Affected Products
Vendor
Catch Themes Demo Import
Product
Catch Themes Demo Import
Versions
Affected
  • From 1.7 through 1.7 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-434CWE-434 Unrestricted Upload of File with Dangerous Type
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Update to version 1.7 or newer.

Configurations

Workarounds

Exploits

Credits

Thinkland Security Team
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39352
x_refsource_MISC
https://plugins.trac.wordpress.org/changeset/2617555/catch-themes-demo-import/trunk/inc/CatchThemesDemoImport.php
x_refsource_MISC
https://github.com/BigTiger2020/word-press/blob/main/Catch%20Themes%20Demo%20Import.md
x_refsource_MISC
http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html
x_refsource_MISC
http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html
x_refsource_MISC
https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39352
x_refsource_MISC
https://www.exploit-db.com/exploits/50580
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39352
x_refsource_MISC
x_transferred
https://plugins.trac.wordpress.org/changeset/2617555/catch-themes-demo-import/trunk/inc/CatchThemesDemoImport.php
x_refsource_MISC
x_transferred
https://github.com/BigTiger2020/word-press/blob/main/Catch%20Themes%20Demo%20Import.md
x_refsource_MISC
x_transferred
http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html
x_refsource_MISC
x_transferred
http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html
x_refsource_MISC
x_transferred
https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39352
x_refsource_MISC
x_transferred
https://www.exploit-db.com/exploits/50580
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found