Lucene search

K
IptanusWordpress File Upload

5 matches found

CVE
CVE
added 2025/01/08 8:15 a.m.66 views

CVE-2024-11635

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.

9.8CVSS9.8AI score0.04598EPSS
CVE
CVE
added 2025/01/08 7:15 a.m.64 views

CVE-2024-11613

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allo...

9.8CVSS9.7AI score0.67914EPSS
CVE
CVE
added 2025/02/25 8:15 a.m.51 views

CVE-2024-13494

The WordPress File Upload plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.25.2. This is due to missing or incorrect nonce validation on the 'wfu_file_details' function. This makes it possible for unauthenticated attackers to modify user data ...

4.3CVSS6.5AI score0.00017EPSS
CVE
CVE
added 2025/01/08 9:15 a.m.40 views

CVE-2024-9939

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.

7.5CVSS7.4AI score0.00478EPSS
CVE
CVE
added 2025/01/07 10:15 a.m.39 views

CVE-2024-12719

The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with Subscriber-level ac...

4.3CVSS4.3AI score0.00038EPSS