Theme Vulnerability Hub
Theme 1 known issue Latest disclosed Jan 04, 2013

Eptonic Vulnerabilities

Review known vulnerability records for the WordPress theme Eptonic (`eptonic`), including severity, CVE references, affected versions, and patch status.

Known Records
1
High or Critical
1
Patch Coverage
100%
Last Updated
Jan 22, 2024
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Eptonic so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
1 record include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
1 critical and 0 high severity findings.
Recent CVEs
This page still provides patch and version coverage even when a CVE ID is not listed.
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Critical No patch listed

Eptonic <= 1.4 - Arbitrary File Upload

The Eptonic theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the VALUMS_UPLOADER_PATH/php.php file in versions up to, and including, 1.4. Th...

Published
Jan 04, 2013
Patch Status
Not published
Known Vulnerabilities

Reports for Eptonic

Sorted by latest disclosure date so newly published issues surface first.

Theme Critical Patched: No
Eptonic <= 1.4 - Arbitrary File Upload

The Eptonic theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the VALUMS_UPLOADER_PATH/php.php file in versions up to, and including, 1.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affect...

Published
Jan 04, 2013
Patched Release
Not published
Affected Versions
Versions up to 1.4
Next Step
Open the full report for remediation notes and references.