Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12042: CWE-434 Unrestricted Upload of File with Dangerous Type in inspireui MStore API – Create Native Android & iOS Apps On The Cloud

0
Medium
VulnerabilityCVE-2024-12042cvecve-2024-12042cwe-434
Published: Fri Dec 13 2024 (12/13/2024, 08:24:50 UTC)
Source: CVE Database V5
Vendor/Project: inspireui
Product: MStore API – Create Native Android & iOS Apps On The Cloud

Description

CVE-2024-12042 is a medium severity vulnerability in the inspireui MStore API WordPress plugin that allows authenticated users with subscriber-level access or higher to upload malicious HTML files via the profile picture upload feature. This occurs due to insufficient file type validation, enabling stored cross-site scripting (XSS) attacks. When other users access these malicious files, arbitrary scripts execute, potentially compromising user data and session integrity. The vulnerability affects all versions up to 4. 16. 4 and requires user interaction to trigger the script execution. There are no known exploits in the wild yet, but the vulnerability's scope and ease of exploitation pose a tangible risk to websites using this plugin. Organizations relying on this plugin for mobile app creation should prioritize patching or applying mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:59:06 UTC

Technical Analysis

CVE-2024-12042 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the inspireui MStore API plugin for WordPress, which facilitates the creation of native Android and iOS apps on the cloud. The flaw exists in the profile picture upload functionality, where the plugin fails to properly validate the file types being uploaded. Authenticated users with subscriber-level privileges or higher can exploit this by uploading HTML files containing arbitrary JavaScript code. These malicious scripts are stored on the server and executed whenever any user accesses the uploaded file, resulting in a stored cross-site scripting (XSS) attack. The vulnerability affects all plugin versions up to and including 4.16.4. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with no effect on availability. No patches have been officially released yet, and no known exploits are currently reported in the wild. The vulnerability’s exploitation could lead to session hijacking, user impersonation, or unauthorized actions within the affected WordPress environment, especially since the plugin is widely used for mobile app backend integration.

Potential Impact

The primary impact of this vulnerability is the potential for stored XSS attacks, which can compromise user confidentiality and integrity by stealing session tokens, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. Since the vulnerability requires authenticated access at subscriber level or above, attackers with minimal privileges can escalate their impact significantly. This can lead to broader compromise of the WordPress site, including administrative accounts if targeted carefully. Organizations using the MStore API plugin for mobile app backend services risk exposing their user base to phishing, data theft, and reputational damage. Additionally, attackers could leverage this vulnerability to implant persistent malicious scripts affecting all users who view the infected profile pictures. Although availability is not directly impacted, the indirect consequences of trust erosion and potential data breaches can be severe. The vulnerability’s network attack vector and low complexity make it relatively easy to exploit once an attacker has valid credentials, increasing the risk for affected organizations.

Mitigation Recommendations

To mitigate CVE-2024-12042, organizations should immediately restrict profile picture uploads to safe file types by implementing strict server-side validation that only permits image formats such as JPEG, PNG, or GIF, explicitly blocking HTML and script files. Employing content security policies (CSP) can help limit the impact of any injected scripts by restricting script execution sources. Additionally, applying least privilege principles to user roles can reduce the risk by limiting subscriber-level users’ ability to upload files if possible. Monitoring and logging upload activities for suspicious file types or anomalous behavior is recommended to detect exploitation attempts early. Until an official patch is released, consider disabling the profile picture upload feature or replacing the plugin with a secure alternative. Web application firewalls (WAFs) configured to detect and block XSS payloads in uploads can provide an additional layer of defense. Regularly updating WordPress and all plugins, and subscribing to vendor security advisories, will ensure timely application of future patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T17:46:10.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2bb7ef31ef0b5972a1

Added to database: 2/25/2026, 9:48:27 PM

Last enriched: 2/26/2026, 6:59:06 AM

Last updated: 2/26/2026, 7:02:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats