9.8
CVE-2024-11613
- EPSS 78.73%
- Veröffentlicht 08.01.2025 07:15:26
- Zuletzt bearbeitet 17.04.2025 02:41:14
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WordPress File Upload <= 4.24.15 - Unauthenticated Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion
The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.
Mögliche Gegenmaßnahme
Iptanus File Upload: Update to version 4.25.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Iptanus File Upload
Version
* - 4.24.15
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Iptanus ≫ Wordpress File Upload SwPlatformwordpress Version < 4.25.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 78.73% | 0.99 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.