Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
| CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
Wed, 08 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Jan 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server. | |
| Title | WordPress File Upload <= 4.24.12 - Unuathenticated Remote Code Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:17:07.660Z
Reserved: 2024-11-22T18:05:20.006Z
Link: CVE-2024-11635
Updated: 2025-01-08T14:17:33.170Z
Status : Modified
Published: 2025-01-08T08:15:24.117
Modified: 2026-04-08T19:19:44.000
Link: CVE-2024-11635
No data.
OpenCVE Enrichment
No data.