Home

Description

The WP ULike Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the WP_Ulike_Pro_File_Uploader class in all versions up to, and including, 1.9.3. This makes it possible for unauthenticated attackers to upload limited arbitrary files like .php2, .php6, .php7, .phps, .pht, .phtm, .pgif, .shtml, .phar, .inc, .hphp, .ctp, .module, .html, .svg on the affected site's server which may make make other attacks like Cross-Site Scripting possible. Only versions up to 1.8.7 were confirmed vulnerable, however, the earliest tested version for a patch we have access to is 1.9.4, so we are considering 1.9.4 the patched version.

PUBLISHED Reserved 2024-10-08 | Published 2025-08-28 | Updated 2025-08-28 | Assigner Wordfence




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

*
affected

Timeline

2025-08-27:Disclosed

Credits

wesley finder

References

www.wordfence.com/...-b842-4492-82e4-dd979fbe70cf?source=cve

wpulike.com/

cve.org (CVE-2024-9648)

nvd.nist.gov (CVE-2024-9648)

Download JSON