CVE-2016-15043

CRITICAL EXPLOITED NUCLEI

WP Mobile Detector <3.5 - File Upload

Title source: llm

Description

The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.

Exploits (1)

metasploit WORKING POC EXCELLENT
by pluginvulnerabilities.com, Aaditya Purani, h00die · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_mobile_detector_upload_execute.rb

Nuclei Templates (1)

WP Mobile Detector <= 3.5 - Unrestricted File Upload
CRITICALVERIFIEDby D3nverNg,thewindghost

Scores

CVSS v3 9.8
EPSS 0.8252
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2016-06-03
CWE
CWE-434
Status published
Products (2)
Websitez.com, LLC/WP Mobile Detector < 3.5
wp_mobile_detector_project/wp_mobile_detector < 3.5
Published Jul 19, 2025
Tracked Since Feb 18, 2026