CVE-2021-38346

Brizy <= 2.3.11 Authenticated Unrestricted File Upload and Path Traversal

Description

The Brizy Page Builder plugin <= 2.3.11 for WordPress allowed authenticated users to upload executable files to a location of their choice using the brizy_create_block_screenshot AJAX action. The file would be named using the id parameter, which could be prepended with "../" to perform directory traversal, and the file contents were populated via the ibsf parameter, which would be base64-decoded and written to the file. While the plugin added a .jpg extension to all uploaded filenames, a double extension attack was still possible, e.g. a file named shell.php would be saved as shell.php.jpg, and would be executable on a number of common configurations.

Categories

8.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 1.36% Top 25%
Third-Party Advisory wordfence.com
Affected: Brizy.io Brizy - Page Builder
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-38346?
CVE-2021-38346 has been scored as a high severity vulnerability.
How to fix CVE-2021-38346?
To fix CVE-2021-38346, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-38346 being actively exploited in the wild?
It is possible that CVE-2021-38346 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-38346?
CVE-2021-38346 affects Brizy.io Brizy - Page Builder.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.