Plugin Vulnerability Hub
Plugin 30 known issues Latest disclosed Feb 24, 2025

Iptanus File Upload Vulnerabilities

Review known vulnerability records for the WordPress plugin Iptanus File Upload (`wp-file-upload`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2024-13494, CVE-2024-11635 and CVE-2024-9939, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
30
High or Critical
12
Patch Coverage
100%
Last Updated
Mar 24, 2025
Priority CVE Quick Links

Fast paths into Iptanus File Upload CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
27
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Iptanus File Upload so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
30 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
8 critical and 4 high severity findings.
Recent CVEs
CVE-2024-13494, CVE-2024-11635 and CVE-2024-9939
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Iptanus File Upload

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2024-13494
CVE-2024-13494: WordPress File Upload <= 4.25.2 - Cross-Site Request Forgery in wfu_file_details

The WordPress File Upload plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.25.2. This is due to missing or incorrect nonce validation on the 'wfu_file_details' function. This makes it possible for unauthenticated attackers t...

Published
Feb 24, 2025
Patched Release
4.25.3
Affected Versions
Versions up to 4.25.2
Next Step
Update to 4.25.3 or newer if supported.
Plugin Critical Patched: Yes CVE-2024-11635
CVE-2024-11635: WordPress File Upload <= 4.24.12 - Unuathenticated Remote Code Execution

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.

Published
Jan 07, 2025
Patched Release
4.24.14
Affected Versions
Versions up to 4.24.12
Next Step
Update to 4.24.14 or newer if supported.
Plugin High Patched: Yes CVE-2024-9939
CVE-2024-9939: WordPress File Upload <= 4.24.13 - Unauthenticated Path Traversal to Arbitrary File Read in wfu_file_downloader.php

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.

Published
Jan 07, 2025
Patched Release
4.24.14
Affected Versions
Versions up to 4.24.13
Next Step
Update to 4.24.14 or newer if supported.
Plugin Critical Patched: Yes CVE-2024-11613
CVE-2024-11613: WordPress File Upload <= 4.24.15 - Unauthenticated Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion

The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source'...

Published
Jan 07, 2025
Patched Release
4.25.0
Affected Versions
Versions up to 4.24.15
Next Step
Update to 4.25.0 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-12719
CVE-2024-12719: WordPress File Upload <= 4.24.15 - Missing Authorization to Authenticated (Subscriber+) Limited Path Traversal

The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with...

Published
Jan 06, 2025
Patched Release
4.25.0
Affected Versions
Versions up to 4.24.15
Next Step
Update to 4.25.0 or newer if supported.
Plugin Critical Patched: Yes CVE-2024-9047
CVE-2024-9047: WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Suc...

Published
Oct 11, 2024
Patched Release
4.24.12
Affected Versions
Versions up to 4.24.11
Next Step
Update to 4.24.12 or newer if supported.
Plugin High Patched: Yes CVE-2024-7301
CVE-2024-7301: WordPress File Upload <= 4.24.8 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload

The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.24.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject...

Published
Aug 15, 2024
Patched Release
4.24.9
Affected Versions
Versions up to 4.24.8
Next Step
Update to 4.24.9 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-39639
CVE-2024-39639: WordPress File Upload <= 4.24.7 - Missing Authorization

The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wfu_ajax_action_save_shortcode() function in versions up to, and including, 4.24.7. This makes it possible for authenticated attackers, with contributor-le...

Published
Aug 01, 2024
Patched Release
4.24.8
Affected Versions
Versions up to 4.24.7
Next Step
Update to 4.24.8 or newer if supported.
Plugin High Patched: Yes CVE-2024-6494
CVE-2024-6494: WordPress File Upload <= 4.24.7 - Unauthenticated Stored Cross-Site Scripting

The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom text fileds in all versions up to, and including, 4.24.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inje...

Published
Jul 16, 2024
Patched Release
4.24.8
Affected Versions
Versions up to 4.24.7
Next Step
Update to 4.24.8 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-6651
CVE-2024-6651: WordPress File Upload <= 4.24.7 - Reflected Cross-Site Scripting

The WordPress File Upload plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dir' parameter in all versions up to, and including, 4.24.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to...

Published
Jul 16, 2024
Patched Release
4.24.8
Affected Versions
Versions up to 4.24.7
Next Step
Update to 4.24.8 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-5852
CVE-2024-5852: WordPress File Upload <= 4.24.7 - Authenticated (Contributor+) Directory Traversal

The WordPress File Upload plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.24.7 via the 'uploadpath' parameter of the wordpress_file_upload shortcode. This makes it possible for authenticated attackers, with Contributor-level acces...

Published
Jul 15, 2024
Patched Release
4.24.8
Affected Versions
Versions up to 4.24.7
Next Step
Update to 4.24.8 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-2847
CVE-2024-2847: WordPress File Upload <= 4.24.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.24.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible fo...

Published
Mar 29, 2024
Patched Release
4.24.6
Affected Versions
Versions up to 4.24.5
Next Step
Update to 4.24.6 or newer if supported.