CVE-2024-11613

Published Jan 8, 2025

Last updated 3 months ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-11613 affects the WordPress File Upload plugin. Specifically, versions up to and including 4.24.15 are vulnerable. The vulnerability stems from a lack of proper sanitization of the 'source' parameter in the 'wfu_file_downloader.php' file, which allows a user-defined directory path. This flaw allows unauthenticated attackers to perform remote code execution, arbitrary file reading, and arbitrary file deletion on the server. Users are advised to update to version 4.24.16 or later to mitigate the risk.

Description
The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.
Source
security@wordfence.com
NVD status
Received

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security@wordfence.com
CWE-94

Social media

Hype score
Not currently trending