### [CVE-2021-24284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24284) ![](https://img.shields.io/static/v1?label=Product&message=Kaswara%20Modern%20VC%20Addons&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brightgreen) ### Description The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP. ### POC #### Reference - http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html - https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/InMyMine7/SharkXploit