WordPress WP Time Capsule Arbitrary File Upload to RCE
Title source: metasploitDescription
The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploits (5)
metasploit
WORKING POC
EXCELLENT
by Valentin Lobstein, Rein Daelman · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_time_capsule_file_upload_rce.rb
Nuclei Templates (1)
WP Time Capsule Plugin - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
FOFA:
body="/wp-content/plugins/wp-time-capsule/"
References (5)
Scores
CVSS v3
9.8
EPSS
0.9304
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+1 more repos
Details
VulnCheck KEV
2025-03-19
CWE
CWE-434
Status
published
Products (2)
revmakx/Backup and Staging by WP Time Capsule
< 1.22.21
revmakx/backup_and_staging_by_wp_time_capsule
< 1.22.22
Published
Nov 16, 2024
Tracked Since
Feb 18, 2026