
Cloud Vulnerability DB
A community-led vulnerabilities database
The Workreap WordPress theme before version 2.2.2 contained a critical security vulnerability identified as CVE-2021-24499. The vulnerability was discovered in June 2021 and affected the theme's AJAX actions 'workreapawardtempfileuploader' and 'workreaptempfile_uploader'. This security flaw allowed for arbitrary file uploads to the uploads/workreap-temp directory without proper authentication or validation (Jetpack, WPScan).
The vulnerability stemmed from the absence of nonce checks and user validation in the theme's AJAX actions. The affected endpoints permitted unauthenticated file uploads without any sanitization or validation of the uploaded files. This vulnerability was assigned a CVSSv3.1 score of 10.0, indicating critical severity, and was categorized under CWE-284 and CWE-641. The security flaw was particularly dangerous as it allowed unauthorized visitors to upload executable code, including PHP scripts, to the server (Jetpack).
The vulnerability could lead to remote code execution and full site takeover. An unauthenticated attacker could upload malicious PHP files to the server, potentially gaining unauthorized access to the website and executing arbitrary code. This could result in complete compromise of the affected WordPress installation (Jetpack).
The vulnerability was patched in version 2.2.2 of the Workreap theme, released on June 29, 2021. Users were strongly advised to upgrade to version 2.2.2 or later immediately. The update could be obtained either by downloading directly from the theme website or by upgrading automatically through the Envato market plugin (Jetpack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."