CVE-2024-5852: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in nickboss WordPress File Upload
CVE-2024-5852 is a medium-severity directory traversal vulnerability in the nickboss WordPress File Upload plugin affecting all versions up to 4. 24. 7. It allows authenticated users with Contributor-level or higher privileges to manipulate the 'uploadpath' parameter in the wordpress_file_upload shortcode to upload files to arbitrary locations on the web server. This improper limitation of pathname (CWE-22) can lead to unauthorized file placement, potentially enabling attackers to modify or replace files outside the intended upload directory. Although this vulnerability does not directly impact confidentiality or availability, it compromises integrity and could facilitate further attacks such as web shell deployment or code execution. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or apply strict access controls to mitigate risk.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-5852 affects the WordPress File Upload plugin developed by nickboss, specifically versions up to and including 4.24.7. The flaw is a directory traversal vulnerability (CWE-22) that arises from improper validation and limitation of the 'uploadpath' parameter within the wordpress_file_upload shortcode. Authenticated users with Contributor-level access or higher can exploit this by specifying crafted paths in the 'uploadpath' parameter to upload files outside the designated upload directories. This bypasses intended directory restrictions, allowing attackers to place files in arbitrary locations on the web server's filesystem. Although the vulnerability does not directly disclose sensitive data or cause denial of service, it compromises the integrity of the server by enabling unauthorized file placement. Such unauthorized file uploads can be leveraged to deploy malicious scripts or web shells, potentially leading to remote code execution or persistent backdoors. The CVSS 3.1 base score is 4.3 (medium), reflecting the network attack vector, low attack complexity, and requirement for privileges but no user interaction. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability requires authenticated access, limiting exposure to users with at least Contributor privileges, but given the popularity of WordPress and this plugin, the risk remains significant for affected sites.
Potential Impact
The primary impact of CVE-2024-5852 is on the integrity of affected WordPress installations using the vulnerable File Upload plugin. Attackers with Contributor-level access can upload files to arbitrary locations, potentially overwriting critical files or placing malicious scripts such as web shells. This can lead to unauthorized code execution, privilege escalation, or persistent backdoors, severely compromising the affected web server. While confidentiality and availability are not directly impacted by this vulnerability, the resulting compromise could lead to data breaches or service disruptions. Organizations relying on this plugin for file uploads face increased risk of website defacement, malware distribution, or lateral movement within their infrastructure. The requirement for authenticated access reduces the attack surface but does not eliminate risk, especially in environments with multiple contributors or weak account controls. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability’s nature makes it a valuable target for attackers once weaponized.
Mitigation Recommendations
To mitigate CVE-2024-5852, organizations should first verify if they are using the nickboss WordPress File Upload plugin and identify the version in use. Since no official patch links are currently available, immediate mitigation includes restricting Contributor-level and higher user permissions to trusted individuals only, minimizing the risk of exploitation. Administrators should audit existing uploaded files and server directories for unauthorized changes or suspicious files. Implementing web application firewalls (WAFs) with rules to detect and block directory traversal attempts targeting the 'uploadpath' parameter can provide additional protection. Monitoring logs for unusual file upload activity or access patterns is recommended. Where possible, isolate the WordPress environment and enforce strict file system permissions to limit the impact of arbitrary file uploads. Organizations should track updates from the plugin vendor and apply patches promptly once released. Additionally, consider alternative secure file upload plugins with robust input validation and security controls if immediate patching is not feasible.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-5852: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in nickboss WordPress File Upload
Description
CVE-2024-5852 is a medium-severity directory traversal vulnerability in the nickboss WordPress File Upload plugin affecting all versions up to 4. 24. 7. It allows authenticated users with Contributor-level or higher privileges to manipulate the 'uploadpath' parameter in the wordpress_file_upload shortcode to upload files to arbitrary locations on the web server. This improper limitation of pathname (CWE-22) can lead to unauthorized file placement, potentially enabling attackers to modify or replace files outside the intended upload directory. Although this vulnerability does not directly impact confidentiality or availability, it compromises integrity and could facilitate further attacks such as web shell deployment or code execution. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or apply strict access controls to mitigate risk.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-5852 affects the WordPress File Upload plugin developed by nickboss, specifically versions up to and including 4.24.7. The flaw is a directory traversal vulnerability (CWE-22) that arises from improper validation and limitation of the 'uploadpath' parameter within the wordpress_file_upload shortcode. Authenticated users with Contributor-level access or higher can exploit this by specifying crafted paths in the 'uploadpath' parameter to upload files outside the designated upload directories. This bypasses intended directory restrictions, allowing attackers to place files in arbitrary locations on the web server's filesystem. Although the vulnerability does not directly disclose sensitive data or cause denial of service, it compromises the integrity of the server by enabling unauthorized file placement. Such unauthorized file uploads can be leveraged to deploy malicious scripts or web shells, potentially leading to remote code execution or persistent backdoors. The CVSS 3.1 base score is 4.3 (medium), reflecting the network attack vector, low attack complexity, and requirement for privileges but no user interaction. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability requires authenticated access, limiting exposure to users with at least Contributor privileges, but given the popularity of WordPress and this plugin, the risk remains significant for affected sites.
Potential Impact
The primary impact of CVE-2024-5852 is on the integrity of affected WordPress installations using the vulnerable File Upload plugin. Attackers with Contributor-level access can upload files to arbitrary locations, potentially overwriting critical files or placing malicious scripts such as web shells. This can lead to unauthorized code execution, privilege escalation, or persistent backdoors, severely compromising the affected web server. While confidentiality and availability are not directly impacted by this vulnerability, the resulting compromise could lead to data breaches or service disruptions. Organizations relying on this plugin for file uploads face increased risk of website defacement, malware distribution, or lateral movement within their infrastructure. The requirement for authenticated access reduces the attack surface but does not eliminate risk, especially in environments with multiple contributors or weak account controls. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability’s nature makes it a valuable target for attackers once weaponized.
Mitigation Recommendations
To mitigate CVE-2024-5852, organizations should first verify if they are using the nickboss WordPress File Upload plugin and identify the version in use. Since no official patch links are currently available, immediate mitigation includes restricting Contributor-level and higher user permissions to trusted individuals only, minimizing the risk of exploitation. Administrators should audit existing uploaded files and server directories for unauthorized changes or suspicious files. Implementing web application firewalls (WAFs) with rules to detect and block directory traversal attempts targeting the 'uploadpath' parameter can provide additional protection. Monitoring logs for unusual file upload activity or access patterns is recommended. Where possible, isolate the WordPress environment and enforce strict file system permissions to limit the impact of arbitrary file uploads. Organizations should track updates from the plugin vendor and apply patches promptly once released. Additionally, consider alternative secure file upload plugins with robust input validation and security controls if immediate patching is not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-11T12:38:25.185Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bf3b7ef31ef0b55cfa8
Added to database: 2/25/2026, 9:38:59 PM
Last enriched: 2/26/2026, 2:50:50 AM
Last updated: 2/26/2026, 8:05:18 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.