Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12719: CWE-862 Missing Authorization in nickboss WordPress File Upload

0
Medium
VulnerabilityCVE-2024-12719cvecve-2024-12719cwe-862
Published: Tue Jan 07 2025 (01/07/2025, 09:22:14 UTC)
Source: CVE Database V5
Vendor/Project: nickboss
Product: WordPress File Upload

Description

CVE-2024-12719 is a medium severity vulnerability in the WordPress File Upload plugin by nickboss, affecting all versions up to 4. 24. 15. It arises from a missing authorization check in the 'wfu_ajax_action_read_subfolders' function, allowing authenticated users with Subscriber-level access or higher to perform limited path traversal and view directory structures within WordPress. Although attackers cannot view file contents, this unauthorized directory enumeration can aid in further reconnaissance and targeted attacks. The vulnerability requires no user interaction beyond authentication and has a CVSS score of 4. 3. No known exploits are currently in the wild, and no official patches have been released yet. Organizations using this plugin should monitor for updates and restrict user roles to minimize risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:00:14 UTC

Technical Analysis

CVE-2024-12719 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress File Upload plugin developed by nickboss. The flaw exists in the 'wfu_ajax_action_read_subfolders' function, which lacks proper capability checks to verify if the requesting user has sufficient permissions to access directory listings. This omission allows any authenticated user with at least Subscriber-level privileges to perform limited path traversal attacks, enabling them to enumerate directories and subdirectories within the WordPress environment. While the vulnerability does not permit viewing or downloading file contents, the ability to map directory structures can provide attackers with valuable information for subsequent attacks, such as identifying sensitive directories or files to target. The vulnerability affects all versions of the plugin up to and including 4.24.15. The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the limited impact on confidentiality and no impact on integrity or availability. Exploitation requires authentication but no user interaction beyond that. No public exploits or patches have been reported as of the publication date, indicating the need for proactive mitigation by site administrators.

Potential Impact

The primary impact of CVE-2024-12719 is unauthorized disclosure of directory structure information within WordPress sites using the affected plugin. This can facilitate attacker reconnaissance, enabling them to identify potentially sensitive directories or files, which may lead to more targeted attacks such as privilege escalation, exploitation of other vulnerabilities, or social engineering. Although direct file content access is not possible, the exposure of directory layouts can weaken the security posture of affected sites. Organizations relying on the WordPress File Upload plugin may face increased risk of information leakage, especially if they allow broad Subscriber-level access or have sensitive data stored in predictable directory structures. The vulnerability does not affect system integrity or availability directly but can be a stepping stone for more severe attacks. Given WordPress's widespread use globally, the threat has a broad potential impact, particularly for websites with multiple user roles and contributors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict user roles and permissions, ensuring that Subscriber-level or equivalent users have minimal access rights. Administrators should consider temporarily disabling or uninstalling the WordPress File Upload plugin until an official patch is released. Monitoring plugin updates from nickboss and applying patches promptly once available is critical. Additionally, implementing web application firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting 'wfu_ajax_action_read_subfolders' can reduce exploitation risk. Site owners should audit logs for unusual directory enumeration attempts and educate users about the risks of elevated privileges. Employing the principle of least privilege for all authenticated users and regularly reviewing user access can further reduce exposure. Finally, consider isolating sensitive directories with additional access controls or moving sensitive files outside the webroot where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-17T17:08:58.190Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e46b7ef31ef0b59c2d8

Added to database: 2/25/2026, 9:48:54 PM

Last enriched: 2/26/2026, 3:00:14 AM

Last updated: 2/26/2026, 9:21:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats