The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.
History

Fri, 08 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Fileorganizer
Fileorganizer fileorganizer
CPEs cpe:2.3:a:fileorganizer:fileorganizer:*:*:*:*:*:wordpress:*:*
Vendors & Products Fileorganizer
Fileorganizer fileorganizer

Tue, 29 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Softaculous
Softaculous fileorganizer
CPEs cpe:2.3:a:softaculous:fileorganizer:*:*:*:*:*:*:*:*
Vendors & Products Softaculous
Softaculous fileorganizer
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 29 Oct 2024 15:45:00 +0000

Type Values Removed Values Added
Description The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.
Title FileOrganizer <= 1.0.9 - Authenticated (Subscriber+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-29T15:31:54.552Z

Updated: 2024-10-29T20:00:30.951Z

Reserved: 2024-08-19T20:01:37.544Z

Link: CVE-2024-7985

cve-icon Vulnrichment

Updated: 2024-10-29T20:00:06.298Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-29T16:15:06.180

Modified: 2024-11-08T15:22:33.123

Link: CVE-2024-7985

cve-icon Redhat

No data.