Input validation vulnerability in WordPress File Upload 4.24.7

The WordPress File Upload plugin is not secure and can be easily hacked by anyone. This is because it doesn’t properly check for harmful code in custom text fields. Hackers can use this vulnerability to add their own code to a page, which will run whenever someone visits that page. This can only happen if the file uploader is used on a page or post.

Detected in:

WordPress File Upload open vulnerable versions: >= * <= 4.24.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.