CVE-2024-9611
Increase upload file size & Maximum Execution Time limit <= 2.0 - Reflected Cross-Site Scripting
CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th
The Increase upload file size & Maximum Execution Time limit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
| CWE | CWE-79 |
| Vendor | ttodua |
| Product | increase upload file size & maximum execution time limit |
| Published | Oct 11, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for ttodua increase upload file size & maximum execution time limit
Be the first to know when new medium vulnerabilities affecting ttodua increase upload file size & maximum execution time limit are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
ttodua / Increase upload file size & Maximum Execution Time limit
0 โค 2.0
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/1c432dbe-8542-41de-966a-b2699d1685ce?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3166370%40increase-upload-file-size-maximum-execution-time-limit&new=3166370%40increase-upload-file-size-maximum-execution-time-limit plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/increase-upload-file-size-maximum-execution-time-limit/trunk/library_default_puvox.php?rev=2589469#L8560
Credits
vgo0