The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.
References
Configurations
History
17 Apr 2025, 02:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* | |
First Time |
Iptanus wordpress File Upload
Iptanus |
|
Summary |
|
|
References | () https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3217005/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/31052fe6-a0ae-4502-b2d2-dbc3b3bf672f?source=cve - Third Party Advisory |
08 Jan 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-08 07:15
Updated : 2025-04-17 02:41
NVD link : CVE-2024-11613
Mitre link : CVE-2024-11613
CVE.ORG link : CVE-2024-11613
JSON object : View
Products Affected
iptanus
- wordpress_file_upload
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')