vendor:
WordPress Theme Workreap
by:
Mohammad Hossein Khanaki(Mr_B0hl00l)
9.8
CVSS
CRITICAL
Unauthenticated Upload Leading to Remote Code Execution
434
CWE
Product Name: WordPress Theme Workreap
Affected Version From: 2.2.2002
Affected Version To: 2.2.2002
Patch Exists: YES
Related CWE: CVE-2021-24499
CPE: a:wordpress:workreap:2.2.2
Tags: wpscan,packetstorm,cve,cve2021,rce,workreap,wordpress,wp-plugin,intrusive,wp
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://github.com/RyouYoo/CVE-2021-24499, https://nvd.nist.gov/vuln/detail/CVE-2021-24499, https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb, https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/, http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html
Nuclei Metadata: {'max-request': 2, 'framework': 'wordpress', 'vendor': 'amentotech', 'product': 'workreap'}
Platforms Tested: Windows, Linux
2023
WordPress Theme Workreap 2.2.2 – Unauthenticated Upload Leading to Remote Code Execution
The WordPress Theme Workreap version 2.2.2 is vulnerable to an unauthenticated file upload vulnerability, which can lead to remote code execution. By exploiting this vulnerability, an attacker can upload a malicious PHP file to the target server and execute arbitrary code.
Mitigation:
The vendor has released a patch to address this vulnerability. Users are advised to update to the latest version of the Workreap theme (version 2.2.3) to mitigate this issue. Additionally, it is recommended to restrict file uploads to trusted users and validate the file type and contents before allowing them to be executed on the server.