{"vulnerability": "CVE-2024-3242", "sightings": [{"uuid": "62e33e82-1e42-47cc-a287-e6f3cd89d79b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3242", "type": "seen", "source": "https://t.me/cvedetector/1147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3242 - Brizy \u2013 Page Builder WordPress Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3242 \nPublished : July 18, 2024, 9:15 a.m. | 24\u00a0minutes ago \nDescription : The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension validation in the validateImageContent function called via storeImages in all versions up to, and including, 2.4.43. This makes it possible for authenticated attackers, with contributor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Version 2.4.44 prevents the upload of files ending in .sh and .php. Version 2.4.45 fully patches the issue. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T11:47:00.000000Z"}]}