The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
References
| Link | Resource |
|---|---|
| https://aadityapurani.com/2016/06/03/mobile-detector-poc/ | Exploit Third Party Advisory |
| https://blog.sucuri.net/2016/06/wp-mobile-detector-vulnerability-being-exploited-in-the-wild.html | Exploit Press/Media Coverage |
| https://wordpress.org/plugins/wp-mobile-detector/changelog/ | Product |
| https://wpscan.com/vulnerability/e4739674-eed4-417e-8c4d-2f5351b057cf | Exploit Third Party Advisory |
| https://www.pluginvulnerabilities.com/2016/05/31/aribitrary-file-upload-vulnerability-in-wp-mobile-detector/ | Exploit Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/5a5d5dbd-36f0-4886-adf8-045ec9c2e306?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-07-19 10:15
Updated : 2025-12-16 16:36
NVD link : CVE-2016-15043
Mitre link : CVE-2016-15043
CVE.ORG link : CVE-2016-15043
JSON object : View
Products Affected
wp_mobile_detector_project
- wp_mobile_detector
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
