{"id":"CVE-2024-7985","details":"The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the \"fileorganizer_ajax_handler\" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.","modified":"2026-03-25T19:42:33.783513Z","published":"2024-10-29T16:15:06.180Z","related":["MGASA-2024-0321"],"references":[{"type":"WEB","url":"https://plugins.trac.wordpress.org/browser/fileorganizer/trunk/main/ajax.php#L13"},{"type":"ADVISORY","url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/f79164c2-be3b-496d-b747-3e4b60b7fc2b?source=cve"},{"type":"FIX","url":"https://plugins.trac.wordpress.org/changeset/3149878/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-7985.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0.9"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}