CVE-2024-11613

CRITICAL

WordPress File Upload <4.24.15 - RCE

Title source: llm

Description

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.

Exploits (1)

nomisec WORKING POC 4 stars
by Sachinart · poc
https://github.com/Sachinart/CVE-2024-11613-wp-file-upload

Scores

CVSS v3 9.8
EPSS 0.7507
EPSS Percentile 98.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-94
Status published
Products (2)
iptanus/wordpress_file_upload < 4.25.0
nickboss/Iptanus File Upload < 4.24.15
Published Jan 08, 2025
Tracked Since Feb 18, 2026