First published: Tue Jul 16 2024(Updated: )
The WordPress File Upload plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.24.7 via the 'uploadpath' parameter of the wordpress_file_upload shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload limited files to arbitrary locations on the web server.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Iptanus WordPress File Upload | <4.24.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5852 is rated as a high severity vulnerability due to its potential for directory traversal exploits.
To resolve CVE-2024-5852, update the WordPress File Upload plugin to version 4.24.8 or later.
Authenticated users with Contributor-level access in WordPress are impacted by CVE-2024-5852.
The attack vector for CVE-2024-5852 is through the 'uploadpath' parameter of the wordpress_file_upload shortcode.
All versions of the WordPress File Upload plugin up to and including 4.24.7 are vulnerable to CVE-2024-5852.