CVE-2024-5084
CRITICAL NUCLEIHashthemes Hash Form < 1.1.1 - Unrestricted File Upload
Title source: ruleDescription
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploits (8)
nomisec
WORKING POC
1 stars
by RedTeamBlueTeam · poc
https://github.com/RedTeamBlueTeam/CVE-2024-5084-Red-Team
metasploit
WORKING POC
EXCELLENT
by Francesco Carlucci, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_hash_form_rce.rb
Nuclei Templates (1)
Hash Form <= 1.1.0 - Arbitrary File Upload
CRITICALVERIFIEDby s4e-io
References (3)
Scores
CVSS v3
9.8
EPSS
0.9313
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (2)
hashthemes/hash_form
< 1.1.1
hashthemes/Hash Form – Drag & Drop Form Builder
< 1.1.0
Published
May 23, 2024
Tracked Since
Feb 18, 2026