The Pexels: Free Stock Photos plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'pexels_fsp_images_options_validate' function in all versions up to, and including, 1.2.2. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:02:14.395Z
Reserved: 2024-06-18T17:23:28.103Z
Link: CVE-2024-6132
Updated: 2024-08-01T21:33:04.596Z
Status : Awaiting Analysis
Published: 2024-06-19T06:15:12.520
Modified: 2026-04-08T18:22:18.363
Link: CVE-2024-6132
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:32:15Z
Weaknesses