// For flags

CVE-2021-24499

Workreap theme < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

7
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.

El tema Workreap WordPress versiones anteriores a 2.2.2, las acciones AJAX workreap_award_temp_file_uploader y workreap_temp_file_uploader, no llevaban a cabo comprobaciones de nonce, ni comprueban que la petición proviene de un usuario válido de ninguna otra forma. Los endpoints permitían subir archivos arbitrarios al directorio uploads/workreap-temp. Los archivos subidos no se saneaban ni se comprobaban, permitiendo a un visitante no autenticado subir código ejecutable como scripts php

WordPress theme Workreap version 2.2.2 suffers from a remote shell upload vulnerabilities.

*Credits: Harald Eilertsen (Jetpack)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-14 CVE Reserved
  • 2021-07-02 CVE Published
  • 2021-09-20 First Exploit
  • 2024-08-03 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amentotech
Search vendor "Amentotech"
Workreap
Search vendor "Amentotech" for product "Workreap"
< 2.2.2
Search vendor "Amentotech" for product "Workreap" and version " < 2.2.2"
wordpress
Affected