CVE-2021-24253

Public Exploit
Classyfrieds <= 3.8 - Authenticated Arbitrary File Upload to RCE

Description

The Classyfrieds WordPress plugin through 3.8 does not properly check the uploaded file when an authenticated user adds a listing, only checking the content-type in the request. This allows any authenticated user to upload arbitrary PHP files via the Add Listing feature of the plugin, leading to RCE.

Category

8.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 1.08% Top 25%
Third-Party Advisory github.com Third-Party Advisory wpscan.com
Affected: Unknown Classyfrieds
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-24253?
CVE-2021-24253 has been scored as a high severity vulnerability.
How to fix CVE-2021-24253?
To fix CVE-2021-24253, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-24253 being actively exploited in the wild?
It is possible that CVE-2021-24253 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-24253?
CVE-2021-24253 affects Unknown Classyfrieds.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.