Critical severityNVD Advisory· Published Jan 16, 2026· Updated Apr 15, 2026
CVE-2012-10064
CVE-2012-10064
Description
Omni Secure Files plugin versions prior to 0.1.14 contain an arbitrary file upload vulnerability in the bundled plupload example endpoint. The /wp-content/plugins/omni-secure-files/plupload/examples/upload.php handler allows unauthenticated uploads without enforcing safe file type restrictions, enabling an attacker to place attacker-controlled files under the plugin's uploads directory. This can lead to remote code execution if a server-executable file type is uploaded and subsequently accessed.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- packetstorm.news/files/id/113411nvd
- web.archive.org/web/20121025112632/http%3A//secunia.com/advisories/49441nvd
- web.archive.org/web/20191021091221/https%3A//www.securityfocus.com/bid/53872/nvd
- wordpress.org/plugins/omni-secure-files/nvd
- wpscan.com/vulnerability/376fd666-6471-479c-9b74-1d8088a33e89/nvd
- www.acunetix.com/vulnerabilities/web/wordpress-plugin-omni-secure-files-upload-php-arbitrary-file-upload-0-1-13/nvd
- www.exploit-db.com/exploits/19009nvd
- www.vulncheck.com/advisories/omni-secure-files-unauthenticated-arbitrary-file-uploadnvd
- www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/omni-secure-files/omni-secure-files-0113-arbitrary-file-uploadnvd
News mentions
0No linked articles in our index yet.