<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2021-47940 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2021-47940/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:19:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2021-47940/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47940: WordPress Download From Files Plugin Arbitrary File Upload</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47940-wordpress-upload/</link><pubDate>Sun, 10 May 2026 13:19:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47940-wordpress-upload/</guid><description>WordPress Plugin Download From Files version 1.48 and earlier contains an arbitrary file upload vulnerability (CVE-2021-47940) that allows unauthenticated attackers to upload malicious files by exploiting the AJAX fileupload action.</description><content:encoded><![CDATA[<p>CVE-2021-47940 is an arbitrary file upload vulnerability affecting WordPress Plugin Download From Files version 1.48 and earlier. The vulnerability allows unauthenticated attackers to upload malicious files to a vulnerable WordPress installation. By sending a crafted POST request to the <code>admin-ajax.php</code> endpoint, an attacker can leverage the <code>download_from_files_617_fileupload</code> action and manipulate the <code>allowExt</code> parameter to bypass file type restrictions. This can lead to the upload of arbitrary files, including executable files like PHP shells, to the web root directory, potentially leading to remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Download From Files plugin (&lt;= 1.48).</li>
<li>The attacker crafts a malicious POST request targeting the <code>admin-ajax.php</code> endpoint.</li>
<li>The POST request includes the <code>action</code> parameter set to <code>download_from_files_617_fileupload</code>.</li>
<li>The attacker manipulates the <code>allowExt</code> parameter within the POST request to include or exclude specific file extensions, bypassing intended file type restrictions.</li>
<li>The attacker uploads a malicious file, such as a PHP shell (e.g., <code>shell.php</code>), via the crafted POST request.</li>
<li>The server saves the uploaded file to a predictable location within the WordPress web root (e.g., <code>wp-content/uploads/</code>).</li>
<li>The attacker accesses the uploaded PHP shell via a direct HTTP request to the file&rsquo;s URL (e.g., <code>https://example.com/wp-content/uploads/shell.php</code>).</li>
<li>The attacker executes arbitrary code on the server via the uploaded PHP shell, potentially compromising the entire WordPress installation and the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47940 allows unauthenticated attackers to upload arbitrary files, including PHP shells, to vulnerable WordPress sites. This can lead to complete compromise of the affected WordPress installation, allowing attackers to execute arbitrary code, deface the website, steal sensitive data, or use the server for malicious purposes. The CVSS v3.1 base score for this vulnerability is 9.8 (Critical).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Download From Files plugin to a version greater than 1.48 to patch CVE-2021-47940.</li>
<li>Deploy the Sigma rule provided to detect attempts to exploit CVE-2021-47940 by monitoring for POST requests to <code>admin-ajax.php</code> with the <code>download_from_files_617_fileupload</code> action.</li>
<li>Implement web application firewall (WAF) rules to filter requests containing suspicious file extensions or attempting to bypass file upload restrictions.</li>
<li>Regularly scan WordPress installations for vulnerable plugins and apply updates promptly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2021-47940</category><category>wordpress</category><category>file upload</category><category>rce</category><category>plugin vulnerability</category></item></channel></rss>