Uploadify WordPress plugin versions up to and including 1.0 contain an arbitrary file upload vulnerability in process_upload.php due to missing file type validation. An unauthenticated remote attacker can upload arbitrary files to the affected WordPress site, which may allow remote code execution by uploading executable content to a web-accessible location.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 01:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 23:15:00 +0900

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 16 Jan 2026 07:00:00 +0900

Type Values Removed Values Added
Description Uploadify WordPress plugin versions up to and including 1.0 contain an arbitrary file upload vulnerability in process_upload.php due to missing file type validation. An unauthenticated remote attacker can upload arbitrary files to the affected WordPress site, which may allow remote code execution by uploading executable content to a web-accessible location.
Title Uploadify <= 1.0 Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-20T15:56:51.308Z

Reserved: 2026-01-15T21:11:21.928Z

Link: CVE-2011-10041

cve-icon Vulnrichment

Updated: 2026-01-20T15:56:42.900Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-15T22:16:08.927

Modified: 2026-01-20T16:16:00.930

Link: CVE-2011-10041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-16T22:43:03Z

Weaknesses