Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-6566 | The FoxyPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadify.php file in versions up to, and including, 0.4.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Tue, 22 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 22 Jul 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The FoxyPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadify.php file in versions up to, and including, 0.4.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. | |
| Title | FoxyPress <= 0.4.2.1 - Arbitrary File Upload | |
| Weaknesses | CWE-434 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-07-22T19:47:49.110Z
Reserved: 2025-07-18T21:30:56.367Z
Link: CVE-2012-10020
Updated: 2025-07-22T19:47:45.054Z
Status : Awaiting Analysis
Published: 2025-07-22T02:15:22.110
Modified: 2025-07-22T13:05:40.573
Link: CVE-2012-10020
No data.
OpenCVE Enrichment
Updated: 2025-07-29T07:59:31Z
EUVD