CVE-2026-1306
حرجة / Critical
CVSS 9.8
VULNERABILITY BRIEF
CVE-2026-1306
المصدر الرسمي: NVD
مستوى الخطورة
حرجة (Critical)
درجة CVSS
9.8
حالة الاستغلال KEV
غير مدرجة حاليًا
تاريخ النشر
2026-02-14
وصف الثغرة
The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticated attackers.
الأثر المحتمل
لم تتوفر تفاصيل إضافية في المصدر الرسمي.
التوصيات والمعالجة
لم تتوفر تفاصيل إضافية في المصدر الرسمي.\nراجع روابط المصدر الرسمية.
حالة الاستغلال (KEV)
لا يوجد إدراج حاليًا في قائمة KEV.
المراجع الرسمية
- https://plugins.trac.wordpress.org/browser/midi-synth/tags/1.1.0/midiSynth.php#L110
- https://plugins.trac.wordpress.org/browser/midi-synth/tags/1.1.0/midiSynth.php#L121
- https://plugins.trac.wordpress.org/browser/midi-synth/tags/1.1.0/midiSynthConvert.php#L421
- https://plugins.trac.wordpress.org/browser/midi-synth/tags/1.1.0/midiSynthConvert.php#L492
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d5b695d7-c690-4748-b218-5699d1aa63bf?source=cve
English Technical Fields
Description: The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticated attackers.
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H