Uploadify WordPress plugin versions up to and including 1.0 contain an arbitrary file upload vulnerability in process_upload.php due to missing file type validation. An unauthenticated remote attacker can upload arbitrary files to the affected WordPress site, which may allow remote code execution by uploading executable content to a web-accessible location.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 15 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
Description Uploadify WordPress plugin versions up to and including 1.0 contain an arbitrary file upload vulnerability in process_upload.php due to missing file type validation. An unauthenticated remote attacker can upload arbitrary files to the affected WordPress site, which may allow remote code execution by uploading executable content to a web-accessible location.
Title Uploadify <= 1.0 Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-15T21:44:33.566Z

Reserved: 2026-01-15T21:11:21.928Z

Link: CVE-2011-10041

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-15T22:16:08.927

Modified: 2026-01-15T22:16:08.927

Link: CVE-2011-10041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses