![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-4811 – WordPress File Upload < 4.23.3 - Author+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2023-4811
12 Sep 2023 — The WordPress File Upload WordPress plugin before 4.23.3 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks. El complemento WordPress File Upload de WordPress anterior a 4.23.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con altos privilegios, como los contribuyentes, realizar ataques de Cross-Site Scripting almacenados. The Wordpress File Upload plugin for... • https://wpscan.com/vulnerability/7f9271f2-4de4-4be3-8746-2a3f149eb1d1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-2688 – WordPress File Upload / WordPress File Upload Pro <= 4.19.1 - Authenticated (Administrator+) Path Traversal
https://notcve.org/view.php?id=CVE-2023-2688
23 May 2023 — The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root. • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2915978%40wp-file-upload%2Ftrunk&old=2909107%40wp-file-upload%2Ftrunk&sfp_email=&sfph_mail=#file2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-2767 – WordPress File Upload / WordPress File Upload Pro <= 4.19.1 - Authenticated (Administrator+) Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2023-2767
23 May 2023 — The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.19.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where... • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2915978%40wp-file-upload%2Ftrunk&old=2909107%40wp-file-upload%2Ftrunk&sfp_email=&sfph_mail=#file2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-24962 – WordPress File Upload < 4.16.3 - Contributor+ Path Traversal to RCE
https://notcve.org/view.php?id=CVE-2021-24962
01 Mar 2022 — The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution. Los plugins File Upload Free y Pro de WordPress versiones anteriores a 4.16.3, permiten a usuarios con un rol tan bajo como el de Contribuyente llevar a cabo un salto de ruta por medio de un... • https://plugins.trac.wordpress.org/changeset/2677722 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-24961 – WordPress File Upload < 4.16.3 - Contributor+ Stored Cross-Site Scripting via Shortcode
https://notcve.org/view.php?id=CVE-2021-24961
14 Feb 2022 — The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin before 4.16.3 does not escape some of its shortcode argument, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks El plugin File Upload WordPress de WordPress versiones anteriores a 4.16.3, el plugin wordpress-file-upload-pro de WordPress versiones anteriores a 4.16.3, no escapa a algunos de sus argumentos de shortcode, lo que podría permitir a usuarios con un ro... • https://plugins.trac.wordpress.org/changeset/2677722 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-24960 – WordPress File Upload < 4.16.3 - Contributor+ Stored Cross-Site Scripting via Malicious SVG
https://notcve.org/view.php?id=CVE-2021-24960
14 Feb 2022 — The WordPress File Upload WordPress plugin before 4.16.3, wordpress-file-upload-pro WordPress plugin before 4.16.3 allows users with a role as low as Contributor to configure the upload form in a way that allows uploading of SVG files, which could be then be used for Cross-Site Scripting attacks El plugin WordPress File Upload de WordPress versiones anteriores a 4.16.3, el plugin wordpress-file-upload-pro de WordPress versiones anteriores a 4.16.3, permite a usuarios con un rol tan bajo como el de Contribut... • https://plugins.trac.wordpress.org/changeset/2677722 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-434: Unrestricted Upload of File with Dangerous Type •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-10564 – WordPress File Upload <= 4.12.2 - Directory Traversal to Remote Code Execution
https://notcve.org/view.php?id=CVE-2020-10564
13 Mar 2020 — An issue was discovered in the File Upload plugin before 4.13.0 for WordPress. A directory traversal can lead to remote code execution by uploading a crafted txt file into the lib directory, because of a wfu_include_lib call. Se detectó un problema en el plugin File Upload versiones anteriores a 4.13.0 para WordPress. Un salto de directorio puede conllevar a una ejecución de código remota al cargar un archivo txt diseñado en el directorio lib, debido a una llamada de la función wfu_include_lib. • https://github.com/beerpwn/CVE/tree/master/WP-File-Upload_disclosure_report • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-9844 – WordPress File Upload <= 4.3.3 - Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2018-9844
06 Apr 2018 — The Iptanus WordPress File Upload plugin before 4.3.4 for WordPress mishandles Settings attributes, leading to XSS. El plugin Iptanus WordPress File Upload en versiones anteriores a la 4.3.4 para WordPress gestiona de manera incorrecta los atributos Settings, lo que conduce a Cross-Site Scripting (XSS). The WordPress File Upload plugin before 4.3.4 for WordPress mishandles Settings attributes, leading to XSS. • https://www.exploit-db.com/exploits/44444 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-9172 – WordPress File Upload <= 4.3.2 - Cross-Site Scripting via Shortcodes
https://notcve.org/view.php?id=CVE-2018-9172
31 Mar 2018 — The Iptanus WordPress File Upload plugin before 4.3.3 for WordPress mishandles shortcode attributes. El plugin WordPress File Upload en versiones anteriores a la 4.3.3 de Iptanus para WordPress gestiona de manera incorrecta los atributos shortcode. WordPress File Upload plugin version 4.3.2 suffers from a persistent cross site scripting vulnerability. • https://packetstorm.news/files/id/147139 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-9341 – WordPress File Upload <= 3.4.0 - Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2015-9341
29 Oct 2015 — The wp-file-upload plugin before 3.4.1 for WordPress has insufficient restrictions on upload of .php.js files. El plugin wp-file-upload anterior a la versión 3.4.1 para WordPress tiene restricciones insuficientes en la carga de archivos .php.js. • https://wordpress.org/plugins/wp-file-upload/#developers • CWE-434: Unrestricted Upload of File with Dangerous Type •