Remote Code Execution and File Manipulation in WordPress File Upload Plugin
CVE-2024-11613
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 8 January 2025
Badges
What is CVE-2024-11613?
CVE-2024-11613 is a critical vulnerability affecting the WordPress File Upload plugin developed by Nickboss. This plugin is widely used by WordPress sites to facilitate file uploads from users. The vulnerability allows unauthenticated attackers to execute remote code on the server due to improper sanitization of input parameters, particularly in the file handling component. This exploitation can lead to severe disruptions for organizations, affecting the integrity and confidentiality of their data.
Technical Details
The vulnerability exists in all versions of the WordPress File Upload plugin up to and including version 4.24.15. It is triggered by the wfu_file_downloader.php
file, which does not adequately validate the 'source' parameter, allowing attackers to define arbitrary directory paths. This flaw not only enables the execution of malicious code on impacted servers but also facilitates arbitrary file reading and deletion, resulting in further security risks.
Potential impact of CVE-2024-11613
-
Remote Code Execution: Attackers can run arbitrary code on compromised servers, leading to full control over the hosting environment and potential installation of additional malicious payloads.
-
Data Loss and Manipulation: The ability to read and delete files can result in significant data loss. Sensitive files may be compromised, adversely affecting business operations and data integrity.
-
Reputational Damage: An organization exposed to such vulnerabilities may suffer from a loss of trust among users and customers, potentially leading to long-term repercussions in terms of reputation and client retention.
Affected Version(s)
WordPress File Upload * <= 4.24.15
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
CVE-2024-11613 Description, Impact and Technical Details
CVE-2024-11613 is a critical vulnerability affecting the WordPress File Upload plugin. The issue lies in the 'wfu_file_downloader.php' file, where the…
1 month ago

WordPress Plugin Security Update Advisory (CVE-2024-11613) - ASEC
Overview We have released a security update to address a vulnerability in the WordPress File Upload plugin. Users of affected products are advised to update to the latest version. Affected Products CVE-2024-11613 WordPress File Upload Version: ~4.24.15 (inclusive) Resolved Vulnerabilities Rem...
References
EPSS Score
62% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by AhnLab
Vulnerability published
Vulnerability Reserved