CVE-2024-6651
CVSS Score
V3.1EPSS Score
v2023.03.01There is a 0.0% chance that this vulnerability will be exploited in the wild within the next 30 days.
Attack Vector Metrics
Impact Metrics
Description
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Available Exploits
WordPress File Upload Plugin < 4.24.8 - Cross-Site Scripting
The WordPress File Upload plugin before version 4.24.8 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'dir' parameter in the file browser page before outputting it back, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context.
Related News
Affected Products
Affected Versions:
Affected Versions:
WordPress Vulnerability
Identified and analyzed by Wordfence
Software Type
Patch Status
Published
Software Details
Software Name
WordPress File Upload
Software Slug
wp-file-upload
Affected Versions
Patched Versions
Remediation
Update to version 4.24.8, or a newer patched version
© Defiant Inc. Data provided by Wordfence.