Cyber Posture

CVE-2015-10138

CriticalPublic PoC

Published: 19 July 2025

Published
19 July 2025
Modified
16 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.6754 98.6th percentile
Risk Priority 60 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2015-10138 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Lynton Reed Work The Flow File Upload. Its CVSS base score is 9.8 (Critical).

Operationally, ranked in the top 1.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of uploaded files to block arbitrary files with dangerous types due to missing file type validation.

prevent

Enforces restrictions on file inputs at the upload interface to prevent acceptance of unauthorized or malicious file types.

prevent

Mandates identification, reporting, and patching of the specific flaw in the plugin's file upload functionality.

NVD Description

The Work The Flow File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jQuery-File-Upload-9.5.0 server and test files in versions up to, and including, 2.5.2. This makes it possible for…

more

unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.

Deeper analysisAI

CVE-2015-10138 is an arbitrary file upload vulnerability in the Work The Flow File Upload plugin for WordPress, affecting versions up to and including 2.5.2. The issue arises from missing file type validation in the bundled jQuery-File-Upload-9.5.0 server and test files, enabling attackers to upload arbitrary files to the affected site's server. This flaw is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By uploading malicious files, they can potentially achieve remote code execution on the server, granting high-impact access to confidentiality, integrity, and availability.

Advisories and patches, including WordPress plugin trac changesets 1127456 and 1127457, along with reports from WPScan and Packet Storm Security, indicate mitigation through updating the plugin beyond version 2.5.2 to address the file validation deficiency.

Details

CWE(s)

Affected Products

lynton reed
work the flow file upload
≤ 2.5.2

CVEs Like This One

CVE-2021-35485Shared CWE-434
CVE-2020-36942Shared CWE-434
CVE-2025-34299Shared CWE-434
CVE-2025-26411Shared CWE-434
CVE-2024-57169Shared CWE-434
CVE-2023-53933Shared CWE-434
CVE-2025-68909Shared CWE-434
CVE-2021-47757Shared CWE-434
CVE-2025-68986Shared CWE-434
CVE-2025-56704Shared CWE-434

References