Iptanus Wordpress File Upload vulnerabilities

25 known vulnerabilities affecting iptanus/wordpress_file_upload.

Total CVEs
25
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH6MEDIUM14LOW1

Vulnerabilities

Page 1 of 2
CVE-2024-13494MEDIUMCVSS 4.3fixed in 4.25.32025-02-25
CVE-2024-13494 [MEDIUM] CWE-352 CVE-2024-13494: The WordPress File Upload plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ve The WordPress File Upload plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.25.2. This is due to missing or incorrect nonce validation on the 'wfu_file_details' function. This makes it possible for unauthenticated attackers to modify user data details associated with uploaded files via a forged
nvd
CVE-2024-11613CRITICALCVSS 9.8fixed in 4.25.02025-01-08
CVE-2024-11613 [CRITICAL] CWE-94 CVE-2024-11613: The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary Fil The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it p
nvd
CVE-2024-11635CRITICALCVSS 9.8fixed in 4.24.152025-01-08
CVE-2024-11635 [CRITICAL] CWE-94 CVE-2024-11635: The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all version The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.
nvd
CVE-2024-9939HIGHCVSS 7.5fixed in 4.24.142025-01-08
CVE-2024-9939 [HIGH] CWE-22 CVE-2024-9939: The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.
nvd
CVE-2024-12719MEDIUMCVSS 4.3fixed in 4.25.02025-01-07
CVE-2024-12719 [MEDIUM] CWE-862 CVE-2024-12719: The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform limited path traversal to
nvd
CVE-2024-39639LOWCVSS 3.5fixed in 4.24.82024-11-01
CVE-2024-39639 [MEDIUM] CWE-352 CVE-2024-39639: Broken Access Control vulnerability in Nickolas Bossinas WordPress File Upload allows Exploiting Inc Broken Access Control vulnerability in Nickolas Bossinas WordPress File Upload allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress File Upload: from n/a through 4.24.7.
nvd
CVE-2024-9047CRITICALCVSS 9.8PoCfixed in 4.24.122024-10-12
CVE-2024-9047 [CRITICAL] CWE-22 CVE-2024-9047: The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be
nvd
CVE-2024-7301MEDIUMCVSS 6.1fixed in 4.24.92024-08-16
CVE-2024-7301 [HIGH] CWE-79 CVE-2024-7301: The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.24.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses th
nvd
CVE-2024-6494MEDIUMCVSS 6.1fixed in 4.24.82024-08-07
CVE-2024-6494 [MEDIUM] CWE-79 CVE-2024-6494: The WordPress File Upload WordPress plugin before 4.24.8 does not properly sanitize and escape certa The WordPress File Upload WordPress plugin before 4.24.8 does not properly sanitize and escape certain parameters, which could allow unauthenticated users to execute stored cross-site scripting (XSS) attacks.
nvd
CVE-2024-6651MEDIUMCVSS 6.1PoCfixed in 4.24.82024-08-06
CVE-2024-6651 [MEDIUM] CWE-79 CVE-2024-6651: The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter be The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
nvd
CVE-2024-5852MEDIUMCVSS 4.3fixed in 4.24.82024-07-16
CVE-2024-5852 [MEDIUM] CWE-22 CVE-2024-5852: The WordPress File Upload plugin for WordPress is vulnerable to Directory Traversal in all versions The WordPress File Upload plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.24.7 via the 'uploadpath' parameter of the wordpress_file_upload shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload limited files to arbitrary locations on the web serv
nvd
CVE-2024-2847MEDIUMCVSS 5.4fixed in 4.24.62024-04-09
CVE-2024-2847 [MEDIUM] CWE-79 CVE-2024-2847: The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.24.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inje
nvd
CVE-2023-4811MEDIUMCVSS 5.4fixed in 4.23.32023-10-16
CVE-2023-4811 [MEDIUM] CWE-79 CVE-2023-4811: The WordPress File Upload WordPress plugin before 4.23.3 does not sanitise and escape some of its se The WordPress File Upload WordPress plugin before 4.23.3 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks.
nvd
CVE-2023-2767MEDIUMCVSS 5.5≤ 4.19.12023-06-09
CVE-2023-2767 [MEDIUM] CWE-79 CVE-2023-2767: The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Stor The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.19.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject
nvd
CVE-2023-2688MEDIUMCVSS 4.9≤ 4.19.12023-06-09
CVE-2023-2688 [MEDIUM] CWE-22 CVE-2023-2688: The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root.
nvd
CVE-2021-24962HIGHCVSS 8.8fixed in 4.16.32022-03-28
CVE-2021-24962 [HIGH] CWE-22 CVE-2021-24962: The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as lo The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
nvd
CVE-2021-24961MEDIUMCVSS 5.4fixed in 4.16.32022-03-07
CVE-2021-24961 [MEDIUM] CWE-79 CVE-2021-24961: The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin before 4.16.3 does not escape some of its shortcode argument, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks
nvd
CVE-2021-24960MEDIUMCVSS 5.4fixed in 4.16.32022-03-07
CVE-2021-24960 [MEDIUM] CWE-434 CVE-2021-24960: The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin before 4.16.3 allows users with a role as low as Contributor to configure the upload form in a way that allows uploading of SVG files, which could be then be used for Cross-Site Scripting attacks
nvd
CVE-2020-10564CRITICALCVSS 9.8fixed in 4.13.02020-03-13
CVE-2020-10564 [CRITICAL] CWE-22 CVE-2020-10564: An issue was discovered in the File Upload plugin before 4.13.0 for WordPress. A directory traversal An issue was discovered in the File Upload plugin before 4.13.0 for WordPress. A directory traversal can lead to remote code execution by uploading a crafted txt file into the lib directory, because of a wfu_include_lib call.
nvd
CVE-2015-9340HIGHCVSS 7.5fixed in 3.0.02019-08-22
CVE-2015-9340 [HIGH] CWE-434 CVE-2015-9340: The wp-file-upload plugin before 3.0.0 for WordPress has insufficient restrictions on upload of php, The wp-file-upload plugin before 3.0.0 for WordPress has insufficient restrictions on upload of php, js, pht, php3, php4, php5, phtml, htm, html, and htaccess files.
nvd