Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6315: CWE-434 Unrestricted Upload of File with Dangerous Type in unitecms Blox Page Builder

0
High
VulnerabilityCVE-2024-6315cvecve-2024-6315cwe-434
Published: Tue Aug 06 2024 (08/06/2024, 01:49:57 UTC)
Source: CVE Database V5
Vendor/Project: unitecms
Product: Blox Page Builder

Description

CVE-2024-6315 is a high-severity vulnerability in the unitecms Blox Page Builder WordPress plugin that allows authenticated users with contributor-level or higher permissions to upload arbitrary files due to missing file type validation. This flaw exists in all versions up to and including 1. 0. 65 and can lead to remote code execution on the affected web server. Exploitation requires no user interaction beyond authentication, and the vulnerability impacts confidentiality, integrity, and availability of the site. No public exploits are currently known, but the ease of exploitation and potential impact make this a critical concern for WordPress sites using this plugin. Organizations should prioritize patching or mitigating this vulnerability to prevent compromise. The threat is particularly relevant to countries with high WordPress usage and significant web presence. Immediate mitigation steps include restricting contributor permissions, implementing additional file upload validation, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:08:22 UTC

Technical Analysis

CVE-2024-6315 identifies a critical vulnerability in the unitecms Blox Page Builder plugin for WordPress, specifically in the 'handleUploadFile' function. This function lacks proper validation of uploaded file types, allowing authenticated users with contributor-level or higher permissions to upload arbitrary files to the server. Because the plugin does not restrict file types, attackers can upload malicious scripts or executable files, potentially leading to remote code execution (RCE). The vulnerability affects all versions up to and including 1.0.65. The CVSS 3.1 base score is 8.8, reflecting high impact across confidentiality, integrity, and availability, with low attack complexity and requiring only low privileges (authenticated contributor). No user interaction beyond authentication is needed, and the scope is unchanged but affects the web server hosting the WordPress site. Although no known exploits are currently in the wild, the vulnerability presents a significant risk due to the widespread use of WordPress and the common practice of granting contributor permissions to multiple users. Attackers exploiting this vulnerability could gain persistent access, deface websites, steal sensitive data, or use the compromised server as a foothold for further attacks. The CWE-434 classification highlights the core issue of unrestricted file upload, a common and dangerous web application vulnerability.

Potential Impact

The impact of CVE-2024-6315 is substantial for organizations running WordPress sites with the vulnerable Blox Page Builder plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the web server. This can result in full site compromise, data theft, defacement, or use of the server as a launchpad for lateral movement within the network. Confidentiality is at risk as attackers may access sensitive user or business data. Integrity is compromised through unauthorized modification of website content or backend files. Availability may be affected if attackers deploy ransomware or disrupt services. Given the low privilege required (contributor-level) and no need for user interaction, the vulnerability is relatively easy to exploit once an attacker gains authenticated access. This elevates the risk for organizations with multiple contributors or weak authentication controls. The lack of a patch at the time of reporting further increases exposure. The threat affects a broad range of sectors relying on WordPress for web presence, including e-commerce, media, education, and government websites.

Mitigation Recommendations

To mitigate CVE-2024-6315, organizations should immediately restrict contributor-level permissions to trusted users only and review existing user roles to minimize unnecessary upload privileges. Implement additional server-side validation to restrict allowed file types beyond what the plugin provides, such as blocking executable extensions (.php, .exe, .js) and allowing only safe media types. Employ web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts. Monitor server logs and file system changes for unusual activity indicative of exploitation attempts. Where possible, isolate the WordPress environment using containerization or sandboxing to limit the impact of a successful exploit. Regularly back up website data and test restoration procedures to recover quickly from potential compromises. Stay informed on updates from the plugin vendor and apply patches promptly once available. Consider disabling or replacing the Blox Page Builder plugin if immediate patching is not feasible. Finally, enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise that could lead to exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-25T12:48:59.232Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c00b7ef31ef0b55ed76

Added to database: 2/25/2026, 9:39:12 PM

Last enriched: 2/26/2026, 3:08:22 AM

Last updated: 2/26/2026, 8:07:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats