This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unrestricted File Upload in Celestial Aura. π₯ **Consequences**: Attackers upload malicious PHP files β **Remote Code Execution (RCE)**. Full server compromise possible!
Q2Root Cause? (CWE/Flaw)
π‘οΈ **CWE-434**: Arbitrary File Upload. π **Flaw**: No validation on file types during upload. Allows dangerous extensions (e.g., .php) to bypass security checks.
Q3Who is affected? (Versions/Components)
π¦ **Product**: WordPress Theme 'Celestial Aura'. π’ **Vendor**: dkszone. π **Affected**: Versions **β€ 2.2**. Any site running this theme is at risk.
β οΈ **Threshold**: **LOW**. Requires **Authentication** (any user role β₯ Subscriber). No complex config needed. UI: `wp-admin/admin.php?page=CA-settings`.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Exploit**: **YES**. Public PoC available on GitHub (Nxploited). Wild exploitation likely imminent. CVSS Score: **9.8** (Critical).
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for `Celestial Aura` theme. Verify version β€ 2.2. Check if low-priv users can access theme settings. Look for upload endpoints without type validation.