The Default Thumbnail Plus plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'get_cache_image' function in all versions up to, and including, 1.0.2.3. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjgalbraith
Pjgalbraith default Thumbnail Plus |
|
| CPEs | cpe:2.3:a:pjgalbraith:default_thumbnail_plus:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pjgalbraith
Pjgalbraith default Thumbnail Plus |
|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 |
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-07-09T07:38:29.100Z
Updated: 2026-04-08T16:33:09.264Z
Reserved: 2024-06-19T12:14:12.093Z
Link: CVE-2024-6161
Updated: 2024-08-01T21:33:05.138Z
Status : Awaiting Analysis
Published: 2024-07-09T08:15:11.160
Modified: 2026-04-08T17:19:08.767
Link: CVE-2024-6161
No data.