Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Download-from-files
Download-from-files download From Files Wordpress Wordpress wordpress |
|
| Vendors & Products |
Download-from-files
Download-from-files download From Files Wordpress Wordpress wordpress |
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin Download From Files version 1.48 and earlier contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by exploiting the AJAX fileupload action. Attackers can send POST requests to the admin-ajax.php endpoint with the download_from_files_617_fileupload action, manipulating the allowExt parameter to bypass file type restrictions and upload executable files like PHP shells to the web root. | |
| Title | WordPress Download From Files 1.48 Arbitrary File Upload | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T13:23:46.857Z
Reserved: 2026-02-01T11:24:18.718Z
Link: CVE-2021-47940
Updated: 2026-05-11T13:19:55.497Z
Status : Deferred
Published: 2026-05-10T13:16:30.363
Modified: 2026-05-12T14:24:15.210
Link: CVE-2021-47940
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:23:29Z