CVE-2021-24499
CRITICAL EXPLOITED IN THE WILD NUCLEIAmentotech Workreap < 2.2.2 - Unrestricted File Upload
Title source: ruleDescription
The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
Exploits (6)
exploitdb
WORKING POC
by Mohammad Hossein Khanaki · pythonwebappsphp
https://www.exploit-db.com/exploits/51510
Nuclei Templates (1)
WordPress Workreap - Remote Code Execution
CRITICALby daffainfo
References (3)
Scores
CVSS v3
9.8
EPSS
0.9394
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-12-21
InTheWild.io
2021-12-21
CWE
CWE-434
Status
published
Products (1)
amentotech/workreap
< 2.2.2
Published
Aug 09, 2021
Tracked Since
Feb 18, 2026