CVE-2015-10138
Published: 19 July 2025
Summary
CVE-2015-10138 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Lynton Reed Work The Flow File Upload. Its CVSS base score is 9.8 (Critical).
Operationally, ranked in the top 1.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of uploaded files to block arbitrary files with dangerous types due to missing file type validation.
Enforces restrictions on file inputs at the upload interface to prevent acceptance of unauthorized or malicious file types.
Mandates identification, reporting, and patching of the specific flaw in the plugin's file upload functionality.
NVD Description
The Work The Flow File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jQuery-File-Upload-9.5.0 server and test files in versions up to, and including, 2.5.2. This makes it possible for…
more
unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Deeper analysisAI
CVE-2015-10138 is an arbitrary file upload vulnerability in the Work The Flow File Upload plugin for WordPress, affecting versions up to and including 2.5.2. The issue arises from missing file type validation in the bundled jQuery-File-Upload-9.5.0 server and test files, enabling attackers to upload arbitrary files to the affected site's server. This flaw is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By uploading malicious files, they can potentially achieve remote code execution on the server, granting high-impact access to confidentiality, integrity, and availability.
Advisories and patches, including WordPress plugin trac changesets 1127456 and 1127457, along with reports from WPScan and Packet Storm Security, indicate mitigation through updating the plugin beyond version 2.5.2 to address the file validation deficiency.
Details
- CWE(s)