1.0 Introduction
Recently, WordPress has released security updates to address a critical vulnerability in the WordPress File Upload plugin.
2.0 Impact
This vulnerability could potentially allow unauthenticated attackers to execute remote code, read arbitrary files, and delete files on affected WordPress sites.
3.0 Affected Products
- WordPress File Upload plugin versions 4.24.15 and below.
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the security updates released by Wordfence and apply the necessary updates.
Kindly refer to the following URL: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-file-upload/wordpress-file-upload-42415-unauthenticated-remote-code-execution-arbitrary-file-read-and-arbitrary-file-deletion
Generally, we advise users of this device to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17.30 MYT
Web: https://www.mycert.org.my
5.0 References
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-file-upload/wordpress-file-upload-42415-unauthenticated-remote-code-execution-arbitrary-file-read-and-arbitrary-file-deletion
- https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php
- https://plugins.trac.wordpress.org/changeset/3217005/
- https://nvd.nist.gov/vuln/detail/CVE-2024-11613