The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versions up to, and including, 7.2.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
No history.
Information
Published : 2024-06-19 06:15
Updated : 2025-12-05 20:09
NVD link : CVE-2024-5853
Mitre link : CVE-2024-5853
CVE.ORG link : CVE-2024-5853
JSON object : View
Products Affected
sirv
- sirv
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
