CVE-2024-8242: CWE-434 Unrestricted Upload of File with Dangerous Type in inspireui MStore API – Create Native Android & iOS Apps On The Cloud
CVE-2024-8242 is a medium-severity vulnerability in the inspireui MStore API WordPress plugin that allows authenticated users with subscriber-level access or higher to upload arbitrary files due to missing file type validation in the update_user_profile() function. Although PHP files cannot be uploaded directly, attackers can upload other dangerous file types that may lead to remote code execution, especially when combined with an unauthenticated registration endpoint. The vulnerability affects all versions up to and including 4. 15. 3. Exploitation requires authentication but no user interaction beyond that. No known exploits are currently reported in the wild. The vulnerability poses a risk to websites using this plugin to create native Android and iOS apps on the cloud, potentially compromising site integrity and security.
AI Analysis
Technical Summary
CVE-2024-8242 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the inspireui MStore API plugin for WordPress, which facilitates the creation of native Android and iOS apps on the cloud. The flaw exists in the update_user_profile() function, where the plugin fails to properly validate the file types being uploaded by authenticated users with subscriber-level privileges or higher. This lack of validation allows attackers to upload arbitrary files, excluding PHP files, to the server hosting the WordPress site. Although direct PHP file upload is blocked, attackers can leverage other file types that may be executed or used to facilitate remote code execution (RCE) under certain conditions, especially when combined with an unauthenticated registration endpoint that allows account creation. The vulnerability affects all versions up to 4.15.3. The CVSS 3.1 base score is 4.3, indicating a medium severity, with an attack vector of network, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No public exploits have been reported yet, but the vulnerability could be exploited to compromise the integrity of affected sites, potentially leading to further attacks such as privilege escalation or data tampering.
Potential Impact
Organizations using the inspireui MStore API plugin are at risk of unauthorized file uploads by authenticated users with minimal privileges, which can lead to server compromise or remote code execution if attackers successfully leverage uploaded files. This can result in defacement, data integrity loss, or pivoting to deeper network layers. The risk is heightened for sites that allow open registration, as attackers can create accounts to exploit the vulnerability. This may lead to reputational damage, data breaches, and operational disruptions. Since the plugin is used to create native mobile apps, compromised backend servers could also affect mobile app functionality or user data security. The medium CVSS score reflects moderate impact, but the real-world impact depends on the presence of additional vulnerabilities or misconfigurations that enable execution of uploaded files.
Mitigation Recommendations
Administrators should immediately update the inspireui MStore API plugin to a patched version once available. Until then, implement strict file upload restrictions by configuring the web server or security plugins to block all file types except those explicitly required and safe (e.g., images). Disable or restrict the update_user_profile() function for non-trusted users if possible. Monitor user registrations and uploads for suspicious activity, especially from new accounts. Employ Web Application Firewalls (WAFs) with rules to detect and block arbitrary file uploads. Conduct regular security audits and scanning for unauthorized files on the server. Consider disabling open registration or adding CAPTCHA and email verification to reduce attacker account creation. Finally, review server and application logs for signs of exploitation attempts.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, France, Brazil, Japan, Netherlands
CVE-2024-8242: CWE-434 Unrestricted Upload of File with Dangerous Type in inspireui MStore API – Create Native Android & iOS Apps On The Cloud
Description
CVE-2024-8242 is a medium-severity vulnerability in the inspireui MStore API WordPress plugin that allows authenticated users with subscriber-level access or higher to upload arbitrary files due to missing file type validation in the update_user_profile() function. Although PHP files cannot be uploaded directly, attackers can upload other dangerous file types that may lead to remote code execution, especially when combined with an unauthenticated registration endpoint. The vulnerability affects all versions up to and including 4. 15. 3. Exploitation requires authentication but no user interaction beyond that. No known exploits are currently reported in the wild. The vulnerability poses a risk to websites using this plugin to create native Android and iOS apps on the cloud, potentially compromising site integrity and security.
AI-Powered Analysis
Technical Analysis
CVE-2024-8242 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the inspireui MStore API plugin for WordPress, which facilitates the creation of native Android and iOS apps on the cloud. The flaw exists in the update_user_profile() function, where the plugin fails to properly validate the file types being uploaded by authenticated users with subscriber-level privileges or higher. This lack of validation allows attackers to upload arbitrary files, excluding PHP files, to the server hosting the WordPress site. Although direct PHP file upload is blocked, attackers can leverage other file types that may be executed or used to facilitate remote code execution (RCE) under certain conditions, especially when combined with an unauthenticated registration endpoint that allows account creation. The vulnerability affects all versions up to 4.15.3. The CVSS 3.1 base score is 4.3, indicating a medium severity, with an attack vector of network, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No public exploits have been reported yet, but the vulnerability could be exploited to compromise the integrity of affected sites, potentially leading to further attacks such as privilege escalation or data tampering.
Potential Impact
Organizations using the inspireui MStore API plugin are at risk of unauthorized file uploads by authenticated users with minimal privileges, which can lead to server compromise or remote code execution if attackers successfully leverage uploaded files. This can result in defacement, data integrity loss, or pivoting to deeper network layers. The risk is heightened for sites that allow open registration, as attackers can create accounts to exploit the vulnerability. This may lead to reputational damage, data breaches, and operational disruptions. Since the plugin is used to create native mobile apps, compromised backend servers could also affect mobile app functionality or user data security. The medium CVSS score reflects moderate impact, but the real-world impact depends on the presence of additional vulnerabilities or misconfigurations that enable execution of uploaded files.
Mitigation Recommendations
Administrators should immediately update the inspireui MStore API plugin to a patched version once available. Until then, implement strict file upload restrictions by configuring the web server or security plugins to block all file types except those explicitly required and safe (e.g., images). Disable or restrict the update_user_profile() function for non-trusted users if possible. Monitor user registrations and uploads for suspicious activity, especially from new accounts. Employ Web Application Firewalls (WAFs) with rules to detect and block arbitrary file uploads. Conduct regular security audits and scanning for unauthorized files on the server. Consider disabling open registration or adding CAPTCHA and email verification to reduce attacker account creation. Finally, review server and application logs for signs of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-27T19:23:47.160Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c24b7ef31ef0b560664
Added to database: 2/25/2026, 9:39:48 PM
Last enriched: 2/26/2026, 3:53:33 AM
Last updated: 2/26/2026, 7:04:52 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.