CVE-2024-5853

The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versions up to, and including, 7.2.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*

History

05 Dec 2025, 20:09

Type Values Removed Values Added
CPE cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*
First Time Sirv sirv
Sirv
CWE CWE-434
References () https://plugins.trac.wordpress.org/changeset/3103410/sirv/trunk/sirv.php - () https://plugins.trac.wordpress.org/changeset/3103410/sirv/trunk/sirv.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/e89b40ec-1952-46e3-a91b-bd38e62f8929?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/e89b40ec-1952-46e3-a91b-bd38e62f8929?source=cve - Third Party Advisory

21 Nov 2024, 09:48

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/3103410/sirv/trunk/sirv.php - () https://plugins.trac.wordpress.org/changeset/3103410/sirv/trunk/sirv.php -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/e89b40ec-1952-46e3-a91b-bd38e62f8929?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/e89b40ec-1952-46e3-a91b-bd38e62f8929?source=cve -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) El complemento Image Optimizer, Resizer y CDN – Sirv para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validación del tipo de archivo en la acción AJAX sirv_upload_file_by_chanks en todas las versiones hasta la 7.2.6 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código.

19 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 06:15

Updated : 2025-12-05 20:09


NVD link : CVE-2024-5853

Mitre link : CVE-2024-5853

CVE.ORG link : CVE-2024-5853


JSON object : View

Products Affected

sirv

  • sirv
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type