Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51790: Unrestricted Upload of File with Dangerous Type in HB WEBSOL HB AUDIO GALLERY

0
Unknown
VulnerabilityCVE-2024-51790cvecve-2024-51790
Published: Mon Nov 11 2024 (11/11/2024, 05:55:50 UTC)
Source: CVE Database V5
Vendor/Project: HB WEBSOL
Product: HB AUDIO GALLERY

Description

Unrestricted Upload of File with Dangerous Type vulnerability in HB WEBSOL HB AUDIO GALLERY hb-audio-gallery allows Upload a Web Shell to a Web Server.This issue affects HB AUDIO GALLERY: from n/a through <= 3.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 08:04:41 UTC

Technical Analysis

CVE-2024-51790 is a security vulnerability identified in the HB AUDIO GALLERY plugin developed by HB WEBSOL, affecting versions up to and including 3.0. The vulnerability allows an attacker to upload files of dangerous types without restriction, effectively enabling the upload of web shells to the targeted web server. Web shells are malicious scripts that provide attackers with remote command execution capabilities, allowing them to control the server, escalate privileges, steal data, or pivot within the network. The core issue stems from insufficient validation and filtering of uploaded files, which should normally restrict executable or script files to prevent such attacks. The vulnerability does not require authentication or user interaction, meaning any unauthenticated attacker can exploit it remotely. While no public exploits or active exploitation have been reported yet, the nature of the vulnerability makes it a prime target for attackers seeking to compromise websites running this plugin. The plugin is typically used in WordPress environments to manage audio galleries, and its presence on publicly accessible web servers increases the attack surface. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details suggest a high risk due to the potential for remote code execution and full server compromise.

Potential Impact

The impact of CVE-2024-51790 is significant for organizations using the HB AUDIO GALLERY plugin on their websites. Successful exploitation can lead to remote code execution, allowing attackers to upload web shells that provide persistent, unauthorized access to the web server. This can result in data breaches, defacement, malware distribution, lateral movement within internal networks, and complete loss of server integrity and availability. Organizations may face operational disruptions, reputational damage, regulatory penalties, and financial losses. The vulnerability's ease of exploitation—requiring no authentication or user interaction—amplifies the risk, especially for publicly accessible websites. Small and medium-sized enterprises that rely on WordPress plugins without rigorous security controls are particularly vulnerable. Additionally, compromised servers can be leveraged to launch further attacks, including phishing campaigns or distributed denial-of-service (DDoS) attacks, increasing the broader threat landscape.

Mitigation Recommendations

To mitigate CVE-2024-51790, organizations should immediately implement strict file upload validation and filtering mechanisms to block dangerous file types such as PHP, ASP, or other executable scripts. Employ allowlists for permitted file extensions and verify MIME types server-side. Disable or restrict file upload functionality if not essential. Monitor web server directories for unauthorized file uploads, especially for files with suspicious extensions or recent modification timestamps. Implement web application firewalls (WAFs) with rules to detect and block web shell uploads and execution attempts. Regularly audit and update all plugins, including HB AUDIO GALLERY, applying vendor patches as soon as they become available. Conduct security assessments and penetration testing focused on file upload functionalities. Isolate and investigate any suspicious activity promptly. Additionally, consider running web applications with least privilege permissions to limit the impact of a successful exploit. Backup website data regularly and ensure backups are stored securely offline to enable recovery from compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-04T09:57:36.650Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd751be6bfc5ba1df02e1e

Added to database: 4/1/2026, 7:42:19 PM

Last enriched: 4/2/2026, 8:04:41 AM

Last updated: 4/6/2026, 9:38:21 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses