CVE-2012-10020

CRITICAL

FoxyPress <0.4.2.1 - File Upload

Title source: llm

Description

The FoxyPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadify.php file in versions up to, and including, 0.4.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.

Exploits (1)

metasploit WORKING POC EXCELLENT
by Sammy FORGIT, aushack · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_foxypress_upload.rb

Scores

CVSS v3 9.8
EPSS 0.6559
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-434
Status published

Affected Products (1)

webmovementllc/foxypress < 0.4.2.1

Timeline

Published Jul 22, 2025
Tracked Since Feb 18, 2026