Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
Jupiter X Core Plugin Allows Unauthorized File Uploads
CVE-2026-3533
Summary
The Jupiter X Core plugin for WordPress has a security issue that lets attackers with a subscriber-level account or higher upload malicious files. This could lead to code being run on the server or malicious scripts being stored on the site, potentially harming users. Update the plugin to a newer version to fix this problem.
Original title
The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the u...
Original description
The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server configuration
nvd CVSS3.1
8.8
Vulnerability type
CWE-434
Unrestricted File Upload
- https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/control-...
- https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensio...
- https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensio...
- https://www.wordfence.com/threat-intel/vulnerabilities/id/70bc5247-525d-4aae-9d6...
Published: 24 Mar 2026 · Updated: 24 Mar 2026 · First seen: 24 Mar 2026