Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13011: CWE-434 Unrestricted Upload of File with Dangerous Type in Chimpstudio WP Foodbakery

0
Critical
VulnerabilityCVE-2024-13011cvecve-2024-13011cwe-434
Published: Mon Feb 10 2025 (02/10/2025, 18:42:37 UTC)
Source: CVE Database V5
Vendor/Project: Chimpstudio
Product: WP Foodbakery

Description

CVE-2024-13011 is a critical vulnerability in the WP Foodbakery WordPress plugin by Chimpstudio, affecting all versions up to 4. 7. It arises from insufficient validation of file types in the 'upload_publisher_profile_image' function, allowing unauthenticated attackers to upload arbitrary files. This can lead to remote code execution on the affected server without requiring any user interaction or privileges. The vulnerability has a CVSS score of 9. 8, indicating a high severity with full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and potential damage make it a significant threat. Organizations using WP Foodbakery should urgently apply patches or implement mitigations to prevent exploitation. Countries with widespread WordPress usage and significant adoption of this plugin, especially those with large e-commerce or content-driven sites, are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:11:58 UTC

Technical Analysis

CVE-2024-13011 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the WP Foodbakery plugin for WordPress, developed by Chimpstudio. The flaw exists in the 'upload_publisher_profile_image' function, which fails to properly validate the file types being uploaded. This lack of validation enables unauthenticated attackers to upload arbitrary files, including potentially malicious scripts, to the server hosting the WordPress site. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by attackers scanning for vulnerable sites. Successful exploitation could lead to remote code execution (RCE), allowing attackers to execute arbitrary commands on the server, compromise site data, deface websites, or pivot to other internal systems. The vulnerability affects all versions up to and including 4.7 of the plugin. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network-based, no privileges required, and no user interaction needed. While no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers once weaponized. The absence of official patches at the time of disclosure increases the urgency for administrators to apply workarounds or restrict upload functionality until a fix is available.

Potential Impact

The impact of CVE-2024-13011 is severe for organizations using the WP Foodbakery plugin. Exploitation can lead to full system compromise via remote code execution, resulting in unauthorized access to sensitive data, defacement of websites, disruption of services, and potential use of the compromised server as a foothold for further attacks within the network. Confidentiality, integrity, and availability of the affected systems are all at high risk. For e-commerce sites, this could mean theft of customer data or financial fraud. For content-driven sites, it could result in loss of reputation and user trust. The fact that no authentication or user interaction is required significantly lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations without timely mitigation may face data breaches, regulatory penalties, and operational downtime.

Mitigation Recommendations

Until an official patch is released, organizations should take immediate steps to mitigate the risk. These include disabling or restricting the file upload functionality in the WP Foodbakery plugin, especially the 'upload_publisher_profile_image' feature. Implement web application firewall (WAF) rules to block suspicious file uploads and monitor for unusual upload activity. Restrict file types accepted by the server at the web server or application level to only allow safe image formats (e.g., JPEG, PNG). Regularly audit and monitor server file systems for unauthorized files or scripts. Employ strict least privilege permissions on upload directories to prevent execution of uploaded files. Update the plugin to the latest version as soon as a patch becomes available. Additionally, maintain regular backups and have an incident response plan ready in case of compromise. Network segmentation and limiting administrative access can also reduce potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-28T11:17:28.383Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4cb7ef31ef0b59c7d9

Added to database: 2/25/2026, 9:49:00 PM

Last enriched: 2/26/2026, 2:11:58 AM

Last updated: 2/26/2026, 6:45:31 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats