CVE-2021-24499

Workreap theme < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution

Basic Information

CVE State
PUBLISHED
Reserved Date
January 14, 2021
Published Date
August 09, 2021
Last Updated
August 03, 2024
Vendor
Unknown
Product
Workreap
Description
The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
Tags
wordpress php nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
88.17% (Percentile: 99.44%) as of 2025-06-07

Exploit Status

Exploited in the Wild
Yes (2025-05-10 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-10 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

j4k0m/CVE-2021-24499

Type: github • Created: 2021-09-12 12:43:24 UTC • Stars: 17

Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel