CVE-2024-11635

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*

History

13 Mar 2025, 16:30

Type Values Removed Values Added
Summary
  • (es) El complemento WordPress File Upload para WordPress es vulnerable a la ejecución remota de código en todas las versiones hasta la 4.24.12 incluida a través del parámetro de cookie 'wfu_ABSPATH'. Esto permite que atacantes no autenticados ejecuten código en el servidor.
CPE cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
References () https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php - () https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/b5165f60-6515-4a2c-a124-cc88155eaf01?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/b5165f60-6515-4a2c-a124-cc88155eaf01?source=cve - Third Party Advisory
First Time Iptanus wordpress File Upload
Iptanus

08 Jan 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-08 08:15

Updated : 2025-03-13 16:30


NVD link : CVE-2024-11635

Mitre link : CVE-2024-11635

CVE.ORG link : CVE-2024-11635


JSON object : View

Products Affected

iptanus

  • wordpress_file_upload
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')