CVE-2024-5084

CRITICAL NUCLEI

Hashthemes Hash Form < 1.1.1 - Unrestricted File Upload

Title source: rule

Description

The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Exploits (8)

nomisec WORKING POC 8 stars
by Chocapikk · poc
https://github.com/Chocapikk/CVE-2024-5084
nomisec WORKING POC 1 stars
by RedTeamBlueTeam · poc
https://github.com/RedTeamBlueTeam/CVE-2024-5084-Red-Team
nomisec WORKING POC
by Raeezrbr · poc
https://github.com/Raeezrbr/CVE-2024-5084
nomisec WORKING POC
by WOOOOONG · poc
https://github.com/WOOOOONG/CVE-2024-5084
nomisec WORKING POC
by NanoWraith · poc
https://github.com/NanoWraith/CVE-2024-5084
nomisec WORKING POC
by KTN1990 · poc
https://github.com/KTN1990/CVE-2024-5084
metasploit WORKING POC EXCELLENT
by Francesco Carlucci, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_hash_form_rce.rb

Nuclei Templates (1)

Hash Form <= 1.1.0 - Arbitrary File Upload
CRITICALVERIFIEDby s4e-io

Scores

CVSS v3 9.8
EPSS 0.9313
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (2)
hashthemes/hash_form < 1.1.1
hashthemes/Hash Form – Drag & Drop Form Builder < 1.1.0
Published May 23, 2024
Tracked Since Feb 18, 2026