Lucene search

K
IptanusWordpress File Upload

7 matches found

CVE
CVE
added 2024/10/12 7:15 a.m.142 views

CVE-2024-9047

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitatio...

9.8CVSS9.4AI score0.91815EPSS
CVE
CVE
added 2024/04/09 7:15 p.m.51 views

CVE-2024-2847

The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.24.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated att...

6.4CVSS7.6AI score0.00102EPSS
CVE
CVE
added 2024/08/16 5:15 a.m.43 views

CVE-2024-7301

The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.24.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scri...

7.2CVSS6.2AI score0.01491EPSS
CVE
CVE
added 2024/07/16 9:15 a.m.41 views

CVE-2024-5852

The WordPress File Upload plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.24.7 via the 'uploadpath' parameter of the wordpress_file_upload shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to upl...

4.3CVSS5AI score0.00356EPSS
CVE
CVE
added 2024/11/01 3:15 p.m.39 views

CVE-2024-39639

Broken Access Control vulnerability in Nickolas Bossinas WordPress File Upload allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress File Upload: from n/a through 4.24.7.

4.3CVSS4.7AI score0.00029EPSS
CVE
CVE
added 2024/08/06 6:15 a.m.30 views

CVE-2024-6651

The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

6.1CVSS5.8AI score0.06511EPSS
CVE
CVE
added 2024/08/07 6:16 a.m.23 views

CVE-2024-6494

The WordPress File Upload WordPress plugin before 4.24.8 does not properly sanitize and escape certain parameters, which could allow unauthenticated users to execute stored cross-site scripting (XSS) attacks.

6.1CVSS5.7AI score0.00276EPSS