CVE-2011-10041
Severity CVSS v4.0:
CRITICAL
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
15/01/2026
Last modified:
20/01/2026
Description
Uploadify WordPress plugin versions up to and including 1.0 contain an arbitrary file upload vulnerability in process_upload.php due to missing file type validation. An unauthenticated remote attacker can upload arbitrary files to the affected WordPress site, which may allow remote code execution by uploading executable content to a web-accessible location.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://packetstorm.news/files/id/98652
- https://wpscan.com/vulnerability/6946364c-9764-468e-87d5-2dd57e531985/
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-uploadify-remote-file-upload-1-0/
- https://www.vulncheck.com/advisories/uploadify-unauthenticated-arbitrary-file-upload
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/uploadify/uploadify-10-arbitrary-file-upload
- https://packetstorm.news/files/id/98652



