CVE-2024-11613
CRITICALWordPress File Upload <4.24.15 - RCE
Title source: llmDescription
The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.
Exploits (1)
nomisec
WORKING POC
4 stars
by Sachinart · poc
https://github.com/Sachinart/CVE-2024-11613-wp-file-upload
References (4)
Scores
CVSS v3
9.8
EPSS
0.7507
EPSS Percentile
98.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-94
Status
published
Products (2)
iptanus/wordpress_file_upload
< 4.25.0
nickboss/Iptanus File Upload
< 4.24.15
Published
Jan 08, 2025
Tracked Since
Feb 18, 2026