The WordPress File Upload plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.24.7 via the 'uploadpath' parameter of the wordpress_file_upload shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload limited files to arbitrary locations on the web server.
Metrics
Affected Vendors & Products
References
History
Wed, 07 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Iptanus
Iptanus wordpress File Upload |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T21:25:03.088Z
Reserved: 2024-06-11T12:38:25.185Z
Link: CVE-2024-5852

Updated: 2024-08-01T21:25:03.088Z

Status : Modified
Published: 2024-07-16T09:15:03.093
Modified: 2024-11-21T09:48:28.730
Link: CVE-2024-5852

No data.