CVE-2021-24499

CRITICAL EXPLOITED IN THE WILD NUCLEI

Amentotech Workreap < 2.2.2 - Unrestricted File Upload

Title source: rule

Description

The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.

Exploits (6)

exploitdb WORKING POC
by Mohammad Hossein Khanaki · pythonwebappsphp
https://www.exploit-db.com/exploits/51510
nomisec WORKING POC 16 stars
by j4k0m · poc
https://github.com/j4k0m/CVE-2021-24499
nomisec WORKING POC
by jayhutajulu1 · remote
https://github.com/jayhutajulu1/CVE-2021-24499
nomisec WORKING POC
by jytmX · remote
https://github.com/jytmX/CVE-2021-24499
nomisec WORKING POC
by hh-hunter · poc
https://github.com/hh-hunter/cve-2021-24499
inthewild WORKING POC
poc
https://github.com/ryouyoo/cve-2021-24499

Nuclei Templates (1)

WordPress Workreap - Remote Code Execution
CRITICALby daffainfo

Scores

CVSS v3 9.8
EPSS 0.9394
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-12-21
InTheWild.io 2021-12-21
CWE
CWE-434
Status published
Products (1)
amentotech/workreap < 2.2.2
Published Aug 09, 2021
Tracked Since Feb 18, 2026