Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-33306 | The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, and including, 16.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. User registration must be enabled for this to be exploited. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 12 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vanquish
Vanquish wordpress User Extra Fields |
|
CPEs | cpe:2.3:a:vanquish:wordpress_user_extra_fields:*:*:*:*:*:*:*:* | |
Vendors & Products |
Vanquish
Vanquish wordpress User Extra Fields |
|
Metrics |
ssvc
|
Sat, 09 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, and including, 16.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. User registration must be enabled for this to be exploited. | |
Title | WordPress User Extra Fields <= 16.5 - Unauthenticated Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-11-12T18:35:06.961Z
Reserved: 2024-11-04T16:30:03.828Z
Link: CVE-2024-10801

Updated: 2024-11-12T18:35:01.469Z

Status : Awaiting Analysis
Published: 2024-11-09T08:15:04.260
Modified: 2024-11-12T13:56:24.513
Link: CVE-2024-10801

No data.

No data.