Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical2
High1
Medium1
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2025-03-13

CVE-2024-11635 - Wp File Upload Plugin

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.

PLUGIN Wp File Upload

CVE-2024-11635

CRITICAL CVSS 9.8 2025-01-08
Threat Entry Updated 2025-04-17

CVE-2024-11613 - Wp File Upload Plugin

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.

PLUGIN Wp File Upload

CVE-2024-11613

CRITICAL CVSS 9.8 2025-01-08
Threat Entry Updated 2025-03-13

CVE-2024-12719 - Wp File Upload Plugin

The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform limited path traversal to view directories and subdirectories in WordPress. Files cannot be viewed.

PLUGIN Wp File Upload

CVE-2024-12719

MEDIUM CVSS 4.3 2025-01-07
Threat Entry Updated 2025-03-12

CVE-2024-7301 - Wp File Upload Plugin

The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.24.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Wp File Upload

CVE-2024-7301

HIGH CVSS 7.2 2024-08-16
Scroll to top