The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versions up to, and including, 7.2.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46997 | The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versions up to, and including, 7.2.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 05 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sirv
Sirv sirv |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Sirv
Sirv sirv |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T21:25:02.734Z
Reserved: 2024-06-11T12:43:25.899Z
Link: CVE-2024-5853
Updated: 2024-08-01T21:25:02.734Z
Status : Analyzed
Published: 2024-06-19T06:15:12.287
Modified: 2025-12-05T20:09:09.637
Link: CVE-2024-5853
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD