This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis โ
Q1What is this vulnerability? (Essence + Consequences)
๐จ **Essence**: Critical flaw in **Keydatas** WordPress plugin (v2.5.2 & prior). Missing file type validation in `keydatas_downloadImages`. ๐ฅ **Consequences**: Attackers can upload **arbitrary files** to the server.โฆ
๐ก๏ธ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The `keydatas_downloadImages` function fails to verify file extensions or MIME types before saving.โฆ
๐ฅ **Affected**: **WordPress Plugin: Keydatas** (aka "็ฎๆฐ้้ๅจ"). ๐ฆ **Vendor**: zhengdon. ๐ **Versions**: **2.5.2 and earlier**. If you use this plugin for data scraping, you are at risk. ๐ซ Not fixed in these versions.
Q4What can hackers do? (Privileges/Data)
๐ **Attacker Capabilities**: Unauthenticated access. ๐ค Upload **any file** (e.g., PHP webshells). ๐ฅ๏ธ Execute arbitrary code on the server. ๐ Gain full control over the WordPress site. ๐ Access sensitive data.โฆ
๐ **Self-Check**: 1. Check WordPress plugins for **Keydatas**. 2. Verify version is **โค 2.5.2**. 3. Run Nuclei scan with CVE-2024-6220 template. 4.โฆ
๐ฅ **Urgency**: **CRITICAL**. ๐จ **Priority**: **P0/Immediate Action**. โณ **Time**: Patch now. With CVSS 9.8 and no auth required, this is a "zero-day" style risk for active sites.โฆ