Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8242: CWE-434 Unrestricted Upload of File with Dangerous Type in inspireui MStore API – Create Native Android & iOS Apps On The Cloud

0
Medium
VulnerabilityCVE-2024-8242cvecve-2024-8242cwe-434
Published: Fri Sep 13 2024 (09/13/2024, 15:10:45 UTC)
Source: CVE Database V5
Vendor/Project: inspireui
Product: MStore API – Create Native Android & iOS Apps On The Cloud

Description

CVE-2024-8242 is a medium-severity vulnerability in the inspireui MStore API WordPress plugin that allows authenticated users with subscriber-level access or higher to upload arbitrary files due to missing file type validation in the update_user_profile() function. Although PHP files cannot be uploaded directly, attackers can upload other dangerous file types that may lead to remote code execution, especially when combined with an unauthenticated registration endpoint. The vulnerability affects all versions up to and including 4. 15. 3. Exploitation requires authentication but no user interaction beyond that. No known exploits are currently reported in the wild. The vulnerability poses a risk to websites using this plugin to create native Android and iOS apps on the cloud, potentially compromising site integrity and security.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:53:33 UTC

Technical Analysis

CVE-2024-8242 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the inspireui MStore API plugin for WordPress, which facilitates the creation of native Android and iOS apps on the cloud. The flaw exists in the update_user_profile() function, where the plugin fails to properly validate the file types being uploaded by authenticated users with subscriber-level privileges or higher. This lack of validation allows attackers to upload arbitrary files, excluding PHP files, to the server hosting the WordPress site. Although direct PHP file upload is blocked, attackers can leverage other file types that may be executed or used to facilitate remote code execution (RCE) under certain conditions, especially when combined with an unauthenticated registration endpoint that allows account creation. The vulnerability affects all versions up to 4.15.3. The CVSS 3.1 base score is 4.3, indicating a medium severity, with an attack vector of network, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No public exploits have been reported yet, but the vulnerability could be exploited to compromise the integrity of affected sites, potentially leading to further attacks such as privilege escalation or data tampering.

Potential Impact

Organizations using the inspireui MStore API plugin are at risk of unauthorized file uploads by authenticated users with minimal privileges, which can lead to server compromise or remote code execution if attackers successfully leverage uploaded files. This can result in defacement, data integrity loss, or pivoting to deeper network layers. The risk is heightened for sites that allow open registration, as attackers can create accounts to exploit the vulnerability. This may lead to reputational damage, data breaches, and operational disruptions. Since the plugin is used to create native mobile apps, compromised backend servers could also affect mobile app functionality or user data security. The medium CVSS score reflects moderate impact, but the real-world impact depends on the presence of additional vulnerabilities or misconfigurations that enable execution of uploaded files.

Mitigation Recommendations

Administrators should immediately update the inspireui MStore API plugin to a patched version once available. Until then, implement strict file upload restrictions by configuring the web server or security plugins to block all file types except those explicitly required and safe (e.g., images). Disable or restrict the update_user_profile() function for non-trusted users if possible. Monitor user registrations and uploads for suspicious activity, especially from new accounts. Employ Web Application Firewalls (WAFs) with rules to detect and block arbitrary file uploads. Conduct regular security audits and scanning for unauthorized files on the server. Consider disabling open registration or adding CAPTCHA and email verification to reduce attacker account creation. Finally, review server and application logs for signs of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-27T19:23:47.160Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c24b7ef31ef0b560664

Added to database: 2/25/2026, 9:39:48 PM

Last enriched: 2/26/2026, 3:53:33 AM

Last updated: 2/26/2026, 7:04:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats