[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-6271":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-14T08:40:00.356Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":68,"aliases":69,"duplicate_of":9,"upstream":70,"downstream":71,"duplicates":72,"related":73,"reserved_at":9,"published_at":74,"modified_at":74,"state":75,"summary":76,"references_raw":83,"kevs":101,"epss":9,"epss_history":102,"metrics":103,"affected":110},"CVE-2026-6271","The Career Section plugin for WordPress is vulnerable to Arbitrary File Upload in all versions up to, and including, 1.7 via the CV upload handler. This is due to missing file type validation. This makes it possible for unauthenticated attackers to upload files that may be executable, which makes remote code execution possible.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-434","Unrestricted Upload of File with Dangerous Type","The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.","weakness","Draft","Base","Medium",[20],{"id":21,"name":22,"techniques":23},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[24],{"id":25,"name":26,"tactics":27,"countermeasures":43},"T1574.010","Services File Permissions Weakness",[28,31,34,37,40],{"id":29,"name":30},"TA0110","Persistence",{"id":32,"name":33},"TA0111","Privilege Escalation",{"id":35,"name":36},"TA0030","Defense Evasion",{"id":38,"name":39},"TA0005","Stealth",{"id":41,"name":42},"TA0104","Execution",[44,49,53,58,63],{"id":45,"name":46,"tactic":47},"D3-SWI","Software Inventory",{"name":48},"Model",{"id":50,"name":51,"tactic":52},"D3-AVE","Asset Vulnerability Enumeration",{"name":48},{"id":54,"name":55,"tactic":56},"D3-SBV","Service Binary Verification",{"name":57},"Detect",{"id":59,"name":60,"tactic":61},"D3-SU","Software Update",{"name":62},"Harden",{"id":64,"name":65,"tactic":66},"D3-RS","Restore Software",{"name":67},"Restore",[],[],[],[],[],[],"2026-05-14T06:44:08.899Z","Received",{"cisa_kev":77,"cisa_ransomware":77,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":78,"severity_score":79,"severity_version":80,"severity_source":81,"severity_vector":82,"severity_status":75},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[84,89,93,97],{"url":85,"sources":86,"tags":88},"https://www.wordfence.com/threat-intel/vulnerabilities/id/005d1abc-761d-4f9a-bc21-aad63e8efd66?source=cve",[81,87],"nvd",[],{"url":90,"sources":91,"tags":92},"https://plugins.trac.wordpress.org/changeset/3507917/career-section",[81,87],[],{"url":94,"sources":95,"tags":96},"https://plugins.trac.wordpress.org/changeset/3507912/career-section",[81,87],[],{"url":98,"sources":99,"tags":100},"https://plugins.trac.wordpress.org/changeset/3507785/career-section",[81,87],[],[],[],[104,108],{"source":81,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":105,"cvss_v4_0":9},{"baseScore":79,"baseSeverity":106,"vectorString":82,"impactScore":79,"exploitabilityScore":107},"CRITICAL",10,{"source":87,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":109,"cvss_v4_0":9},{"baseScore":79,"baseSeverity":106,"vectorString":82,"impactScore":79,"exploitabilityScore":107},[111],{"ecosystem":9,"name":112,"vendor":113,"product":114,"cpe_part":115,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":116},"Career Section","shahinurislam","career section","a",[117],{"version":118,"is_range":119,"range_type":81,"version_start":9,"version_start_type":9,"version_end":120,"version_end_type":121,"fixed_in":9},"\u003C= 1.7",true,"1.7","including"]