CVE-2015-10138
📋 TL;DR
The Work The Flow File Upload WordPress plugin has an unauthenticated arbitrary file upload vulnerability due to missing file type validation. This allows attackers to upload malicious files to affected WordPress sites, potentially leading to remote code execution. All WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- Work The Flow File Upload WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for further attacks.
Likely Case
Website defacement, malware distribution, credential theft, or use as part of a botnet.
If Mitigated
Limited impact if file uploads are restricted by web application firewall or server-side controls.
🎯 Exploit Status
Exploit code is publicly available and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 2.5.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Work The Flow File Upload' and update to version 2.5.3 or later. 4. Alternatively, disable and remove the plugin if not needed.
🔧 Temporary Workarounds
Disable plugin
allTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate work-the-flow-file-upload
Restrict file uploads via .htaccess
linuxBlock uploads to the vulnerable endpoint using web server configuration.
<FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|php8|inc|pl|py|jsp|asp|aspx|sh|cgi|exe|dll|bat|cmd|ps1|psm1|psd1|vbs|vbe|js|jse|wsf|wsh|msc|jar|war|ear|rb|action|swf|html|htm|svg|xml)">\n Order Allow,Deny\n Deny from all\n</FilesMatch>
🧯 If You Can't Patch
- Implement web application firewall rules to block malicious file uploads
- Restrict file permissions on upload directories to prevent execution
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for 'Work The Flow File Upload' version 2.5.2 or earlier.
Check Version:
wp plugin list --name=work-the-flow-file-upload --field=version
Verify Fix Applied:
Confirm plugin version is 2.5.3 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/work-the-flow-file-upload/
- POST requests to upload.php with suspicious file extensions
- Multiple failed upload attempts
Network Indicators:
- HTTP POST requests to plugin upload endpoints with executable file types
- Unusual outbound connections from web server after uploads
SIEM Query:
source="web_server_logs" AND (uri_path="/wp-content/plugins/work-the-flow-file-upload/" OR uri_path="*upload.php*") AND (file_extension="php" OR file_extension="exe" OR file_extension="sh" OR file_extension="py")
🔗 References
- https://packetstormsecurity.com/files/131294/
- https://packetstormsecurity.com/files/131512/
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1127456%40work-the-flow-file-upload&new=1127456%40work-the-flow-file-upload&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1127457%40work-the-flow-file-upload&new=1127457%40work-the-flow-file-upload&sfp_email=&sfph_mail=
- https://wpscan.com/vulnerability/a49a81a9-3d4b-4c8d-b719-fc513aceecc6
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-work-the-flow-file-upload-arbitrary-file-upload-2-5-2/
- https://www.homelab.it/index.php/2015/04/04/wordpress-work-the-flow-file-upload-vulnerability/
- https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_worktheflow_upload/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/eb271cc8-01ec-45eb-9d6f-efc55c7c3923?source=cve