The theme's AJAX actions `workreap_award_temp_file_uploader` and `workreap_temp_file_uploader` did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
Workreap < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution
WordPress Workreap Theme Remote Code Execution (CVE-2021-24499)
WordPress Workreap premium theme <= 2.2.1 - Unauthenticated Upload vulnerability leading to Remote Code Execution (RCE)
Exploit for Unrestricted Upload of File with Dangerous Type in Amentotech Workreap