CVE-2024-12042: CWE-434 Unrestricted Upload of File with Dangerous Type in inspireui MStore API – Create Native Android & iOS Apps On The Cloud
CVE-2024-12042 is a medium severity vulnerability in the inspireui MStore API WordPress plugin that allows authenticated users with subscriber-level access or higher to upload malicious HTML files via the profile picture upload feature. This occurs due to insufficient file type validation, enabling stored cross-site scripting (XSS) attacks. When other users access these malicious files, arbitrary scripts execute, potentially compromising user data and session integrity. The vulnerability affects all versions up to 4. 16. 4 and requires user interaction to trigger the script execution. There are no known exploits in the wild yet, but the vulnerability's scope and ease of exploitation pose a tangible risk to websites using this plugin. Organizations relying on this plugin for mobile app creation should prioritize patching or applying mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-12042 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the inspireui MStore API plugin for WordPress, which facilitates the creation of native Android and iOS apps on the cloud. The flaw exists in the profile picture upload functionality, where the plugin fails to properly validate the file types being uploaded. Authenticated users with subscriber-level privileges or higher can exploit this by uploading HTML files containing arbitrary JavaScript code. These malicious scripts are stored on the server and executed whenever any user accesses the uploaded file, resulting in a stored cross-site scripting (XSS) attack. The vulnerability affects all plugin versions up to and including 4.16.4. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with no effect on availability. No patches have been officially released yet, and no known exploits are currently reported in the wild. The vulnerability’s exploitation could lead to session hijacking, user impersonation, or unauthorized actions within the affected WordPress environment, especially since the plugin is widely used for mobile app backend integration.
Potential Impact
The primary impact of this vulnerability is the potential for stored XSS attacks, which can compromise user confidentiality and integrity by stealing session tokens, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. Since the vulnerability requires authenticated access at subscriber level or above, attackers with minimal privileges can escalate their impact significantly. This can lead to broader compromise of the WordPress site, including administrative accounts if targeted carefully. Organizations using the MStore API plugin for mobile app backend services risk exposing their user base to phishing, data theft, and reputational damage. Additionally, attackers could leverage this vulnerability to implant persistent malicious scripts affecting all users who view the infected profile pictures. Although availability is not directly impacted, the indirect consequences of trust erosion and potential data breaches can be severe. The vulnerability’s network attack vector and low complexity make it relatively easy to exploit once an attacker has valid credentials, increasing the risk for affected organizations.
Mitigation Recommendations
To mitigate CVE-2024-12042, organizations should immediately restrict profile picture uploads to safe file types by implementing strict server-side validation that only permits image formats such as JPEG, PNG, or GIF, explicitly blocking HTML and script files. Employing content security policies (CSP) can help limit the impact of any injected scripts by restricting script execution sources. Additionally, applying least privilege principles to user roles can reduce the risk by limiting subscriber-level users’ ability to upload files if possible. Monitoring and logging upload activities for suspicious file types or anomalous behavior is recommended to detect exploitation attempts early. Until an official patch is released, consider disabling the profile picture upload feature or replacing the plugin with a secure alternative. Web application firewalls (WAFs) configured to detect and block XSS payloads in uploads can provide an additional layer of defense. Regularly updating WordPress and all plugins, and subscribing to vendor security advisories, will ensure timely application of future patches.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, France, Brazil, Japan, South Korea
CVE-2024-12042: CWE-434 Unrestricted Upload of File with Dangerous Type in inspireui MStore API – Create Native Android & iOS Apps On The Cloud
Description
CVE-2024-12042 is a medium severity vulnerability in the inspireui MStore API WordPress plugin that allows authenticated users with subscriber-level access or higher to upload malicious HTML files via the profile picture upload feature. This occurs due to insufficient file type validation, enabling stored cross-site scripting (XSS) attacks. When other users access these malicious files, arbitrary scripts execute, potentially compromising user data and session integrity. The vulnerability affects all versions up to 4. 16. 4 and requires user interaction to trigger the script execution. There are no known exploits in the wild yet, but the vulnerability's scope and ease of exploitation pose a tangible risk to websites using this plugin. Organizations relying on this plugin for mobile app creation should prioritize patching or applying mitigations to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-12042 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the inspireui MStore API plugin for WordPress, which facilitates the creation of native Android and iOS apps on the cloud. The flaw exists in the profile picture upload functionality, where the plugin fails to properly validate the file types being uploaded. Authenticated users with subscriber-level privileges or higher can exploit this by uploading HTML files containing arbitrary JavaScript code. These malicious scripts are stored on the server and executed whenever any user accesses the uploaded file, resulting in a stored cross-site scripting (XSS) attack. The vulnerability affects all plugin versions up to and including 4.16.4. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity with no effect on availability. No patches have been officially released yet, and no known exploits are currently reported in the wild. The vulnerability’s exploitation could lead to session hijacking, user impersonation, or unauthorized actions within the affected WordPress environment, especially since the plugin is widely used for mobile app backend integration.
Potential Impact
The primary impact of this vulnerability is the potential for stored XSS attacks, which can compromise user confidentiality and integrity by stealing session tokens, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. Since the vulnerability requires authenticated access at subscriber level or above, attackers with minimal privileges can escalate their impact significantly. This can lead to broader compromise of the WordPress site, including administrative accounts if targeted carefully. Organizations using the MStore API plugin for mobile app backend services risk exposing their user base to phishing, data theft, and reputational damage. Additionally, attackers could leverage this vulnerability to implant persistent malicious scripts affecting all users who view the infected profile pictures. Although availability is not directly impacted, the indirect consequences of trust erosion and potential data breaches can be severe. The vulnerability’s network attack vector and low complexity make it relatively easy to exploit once an attacker has valid credentials, increasing the risk for affected organizations.
Mitigation Recommendations
To mitigate CVE-2024-12042, organizations should immediately restrict profile picture uploads to safe file types by implementing strict server-side validation that only permits image formats such as JPEG, PNG, or GIF, explicitly blocking HTML and script files. Employing content security policies (CSP) can help limit the impact of any injected scripts by restricting script execution sources. Additionally, applying least privilege principles to user roles can reduce the risk by limiting subscriber-level users’ ability to upload files if possible. Monitoring and logging upload activities for suspicious file types or anomalous behavior is recommended to detect exploitation attempts early. Until an official patch is released, consider disabling the profile picture upload feature or replacing the plugin with a secure alternative. Web application firewalls (WAFs) configured to detect and block XSS payloads in uploads can provide an additional layer of defense. Regularly updating WordPress and all plugins, and subscribing to vendor security advisories, will ensure timely application of future patches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T17:46:10.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2bb7ef31ef0b5972a1
Added to database: 2/25/2026, 9:48:27 PM
Last enriched: 2/26/2026, 6:59:06 AM
Last updated: 2/26/2026, 7:02:49 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.