Vulnerability Description
The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fileorganizer | Fileorganizer | <= 1.0.9 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/fileorganizer/trunk/main/ajax.php#L13Product
- https://plugins.trac.wordpress.org/changeset/3149878/Patch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f79164c2-be3b-496d-b74Third Party Advisory
FAQ
What is CVE-2024-7985?
CVE-2024-7985 is a vulnerability with a CVSS score of 7.5 (HIGH). The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in ...
How severe is CVE-2024-7985?
CVE-2024-7985 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7985?
Check the references section above for vendor advisories and patch information. Affected products include: Fileorganizer Fileorganizer.