Cyber Posture

CVE-2024-11613

CriticalRCE

Published: 08 January 2025

Published
08 January 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.7507 98.9th percentile
Risk Priority 65 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-11613 is a critical-severity Code Injection (CWE-94) vulnerability in Iptanus Wordpress File Upload. Its CVSS base score is 9.8 (Critical).

Operationally, ranked in the top 1.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching and remediation of the vulnerable WordPress File Upload plugin to eliminate the unsanitized 'source' parameter flaw.

prevent

Requires validation of information inputs like the 'source' parameter to prevent path traversal enabling RCE, arbitrary file read, and deletion.

preventdetect

Enables vulnerability scanning to identify the presence of CVE-2024-11613 in the plugin and initiate remediation.

NVD Description

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization…

more

of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.

Deeper analysisAI

CVE-2024-11613 is a critical vulnerability in the WordPress File Upload plugin for WordPress, affecting all versions up to and including 4.24.15. It stems from insufficient sanitization of the 'source' parameter in the 'wfu_file_downloader.php' file, which permits user-defined directory paths. This flaw enables remote code execution (RCE), arbitrary file read, and arbitrary file deletion, as classified under CWE-94 (Improper Control of Generation of Code). The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and lack of prerequisites.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By manipulating the 'source' parameter, they can target arbitrary files and directories on the server, leading to code execution, data exfiltration via file reads, or disruption through file deletions. Successful exploitation grants full control over the affected WordPress instance, potentially compromising the entire hosting environment.

Advisories and references, including a Wordfence threat intelligence report and an analysis on abrahack.com, detail the issue, while the plugin's source code in the WordPress SVN repository and a specific patch in changeset 3217005 on the WordPress Trac provide mitigation paths. Security practitioners should update the plugin to a version beyond 4.24.15 incorporating the fix in changeset 3217005 to sanitize inputs and restrict path traversal.

Details

CWE(s)

Affected Products

iptanus
wordpress file upload
≤ 4.25.0

CVEs Like This One

CVE-2024-11635Same product: Iptanus Wordpress File Upload
CVE-2024-9939Same product: Iptanus Wordpress File Upload
CVE-2024-40748Same product class: CMS core
CVE-2024-55924Same product class: CMS core
CVE-2026-40488Same product class: CMS core
CVE-2025-24416Same product class: CMS core
CVE-2026-21289Same product class: CMS core
CVE-2025-24410Same product class: CMS core
CVE-2024-11816Same product class: CMS core
CVE-2025-1971Same product class: CMS core

References