
Iptanus File Upload Security & Risk Analysis
wordpress.org/plugins/wp-file-uploadTHIS IS FORMER WORDPRESS FILE UPLOAD PLUGIN. Simple yet powerful plugin to allow users to upload files from any page, post or sidebar and manage them.
Is Iptanus File Upload Safe to Use in 2026?
Generally Safe
Score 87/100Iptanus File Upload has a strong security track record. Known vulnerabilities have been patched promptly.
The wp-file-upload plugin v5.1.7 exhibits a concerning security posture primarily due to a very large attack surface with a significant number of unprotected AJAX handlers. While the code analysis shows good practices in SQL query handling and output escaping, the sheer volume of entry points lacking proper authorization checks presents a substantial risk. The taint analysis revealed flows with unsanitized paths, indicating a potential for path traversal vulnerabilities, although no critical or high severity issues were identified in this specific analysis.
The plugin's historical vulnerability data is alarming. A total of 27 known CVEs, with a notable number of critical and high severity issues, points to a recurring pattern of serious security flaws. The common vulnerability types listed (CSRF, Code Injection, Missing Authorization, Path Traversal, XSS, Unrestricted Upload) are all severe and can lead to complete site compromise. The fact that the last vulnerability was reported very recently (2025-02-24) and there are currently no unpatched vulnerabilities is a positive sign, suggesting active patching by developers, but the sheer volume and severity of past issues cannot be overlooked.
In conclusion, the plugin demonstrates strengths in its handling of SQL queries and output sanitization. However, the massive, unprotected AJAX endpoint attack surface and the extensive, severe historical vulnerability record are critical weaknesses. Users should be highly cautious and ensure they are on the absolute latest version, coupled with a robust WordPress security strategy that includes regular scanning and monitoring for new vulnerabilities. The risk is elevated due to the plugin's historical patterns of severe security flaws.
Key Concerns
- Large attack surface with unprotected AJAX handlers
- Taint analysis found flows with unsanitized paths
- Large number of past critical severity CVEs
- Large number of past high severity CVEs
- Vulnerability history includes Code Injection
- Vulnerability history includes Path Traversal
- Vulnerability history includes Unrestricted Upload
- Vulnerability history includes Missing Authorization
- Recent vulnerability reported (2025-02-24)
Iptanus File Upload Security Vulnerabilities
CVEs by Year
Severity Breakdown
27 total CVEs
WordPress File Upload <= 4.25.2 - Cross-Site Request Forgery in wfu_file_details
WordPress File Upload <= 4.24.12 - Unuathenticated Remote Code Execution
WordPress File Upload <= 4.24.15 - Unauthenticated Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion
WordPress File Upload <= 4.24.13 - Unauthenticated Path Traversal to Arbitrary File Read in wfu_file_downloader.php
WordPress File Upload <= 4.24.15 - Missing Authorization to Authenticated (Subscriber+) Limited Path Traversal
WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php
WordPress File Upload <= 4.24.8 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload
WordPress File Upload <= 4.24.7 - Missing Authorization
WordPress File Upload <= 4.24.7 - Unauthenticated Stored Cross-Site Scripting
WordPress File Upload <= 4.24.7 - Reflected Cross-Site Scripting
WordPress File Upload <= 4.24.7 - Authenticated (Contributor+) Directory Traversal
WordPress File Upload <= 4.24.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Wordpress File Upload 4.24.0 - Cross-Site Request Forgery
Wordpress File Upload <= 4.23.2 - Authenticated(Administrator+) Stored Cross-Site Scripting
WordPress File Upload <= 4.16.3 - Cross-Site Scripting
WordPress File Upload <= 4.16.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Malicious SVG
WordPress File Upload <= 4.16.2 - Authenticated Stored Cross-Site Scripting via Shortcode
WordPress File Upload <= 4.12.2 - Directory Traversal to Remote Code Execution
WordPress File Upload <= 4.3.3 - Stored Cross-Site Scripting
WordPress File Upload <= 4.3.2 - Cross-Site Scripting via Shortcodes
WordPress File Upload < 3.9.0 - Arbitrary File Upload
WordPress File Upload <= 3.4.0 - Arbitrary File Upload
WordPress File Upload < 3.0.0 - Arbitrary File Upload
WordPress File Upload < 2.7.1 - Arbitrary File Upload
WordPress File Upload <= 2.4.6 - Arbitrary File Upload
WordPress File Upload <= 2.4.3 - Reflected Cross-Site Scripting
WordPress File Upload < 2.4.2 - Cross-Site Request Forgery
Iptanus File Upload Code Analysis
Output Escaping
Data Flow Analysis
Iptanus File Upload Attack Surface
AJAX Handlers 27
Shortcodes 2
WordPress Hooks 18
Maintenance & Trust
Iptanus File Upload Maintenance & Trust
Maintenance Signals
Community Trust
Iptanus File Upload Alternatives
Drag and Drop Multiple File Upload for Contact Form 7
drag-and-drop-multiple-file-upload-contact-form-7
This simple plugin create Drag & Drop or choose Multiple File upload in your Confact Form 7 Forms.
Contact Form By Mega Forms – Drag and Drop Form Builder
mega-forms
Contact form builder that allows you to create forms for any purpose. Drag & drop form fields to build modern, professional contact forms in minutes.
MultiLine Files for Contact Form 7
multiline-files-for-contact-form-7
Upload unlimited files to Contact Form 7 with an intuitive interface, file management, and automatic ZIP compression for email delivery.
Drag and Drop Multiple File Upload for WooCommerce
drag-and-drop-multiple-file-upload-for-woocommerce
Drag and Drop Multiple File Uploader is a simple, straightforward WordPress plugin extension for WooCommerce.
Multifile Upload Field for Contact Form 7
multifile-upload-field-for-contact-form-7
Multiple files upload field addon for Contact Form 7
Iptanus File Upload Developer Profile
1 plugin · 10K total installs
How We Detect Iptanus File Upload
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-file-upload/css/wfu_frontend.css/wp-content/plugins/wp-file-upload/css/wfu_admin.css/wp-content/plugins/wp-file-upload/css/wfu_editor_plugin.css/wp-content/plugins/wp-file-upload/css/wfu_materialize.css/wp-content/plugins/wp-file-upload/css/wfu_bootstrap.css/wp-content/plugins/wp-file-upload/css/wfu_bootstrap_theme.css/wp-content/plugins/wp-file-upload/css/wfu_dark_theme.css/wp-content/plugins/wp-file-upload/css/wfu_light_theme.css+11 more/wp-content/plugins/wp-file-upload/js/wfu_frontend.js/wp-content/plugins/wp-file-upload/js/wfu_admin.js/wp-content/plugins/wp-file-upload/js/wfu_editor_plugin.js/wp-content/plugins/wp-file-upload/js/wfu_materialize.js/wp-content/plugins/wp-file-upload/js/wfu_bootstrap.js/wp-content/plugins/wp-file-upload/js/wfu_bootstrap_theme.js+4 morewp-file-upload/css/wfu_frontend.css?ver=wp-file-upload/css/wfu_admin.css?ver=wp-file-upload/css/wfu_editor_plugin.css?ver=wp-file-upload/css/wfu_materialize.css?ver=wp-file-upload/css/wfu_bootstrap.css?ver=wp-file-upload/css/wfu_bootstrap_theme.css?ver=wp-file-upload/css/wfu_dark_theme.css?ver=wp-file-upload/css/wfu_light_theme.css?ver=wp-file-upload/css/wfu_premium_theme.css?ver=wp-file-upload/js/wfu_frontend.js?ver=wp-file-upload/js/wfu_admin.js?ver=wp-file-upload/js/wfu_editor_plugin.js?ver=wp-file-upload/js/wfu_materialize.js?ver=wp-file-upload/js/wfu_bootstrap.js?ver=wp-file-upload/js/wfu_bootstrap_theme.js?ver=wp-file-upload/js/wfu_dark_theme.js?ver=wp-file-upload/js/wfu_light_theme.js?ver=wp-file-upload/js/wfu_premium_theme.js?ver=wp-file-upload/js/tinymce/tinymce.min.js?ver=HTML / DOM Fingerprints
wfu_containerwfu_backend_containerwfu_frontend_containerwfu_buttonwfu_upload_buttonwfu_progress_barwfu_file_listwfu_file_item+8 more<!-- Wordpress File Upload Plugin --><!-- Iptanus File Upload (Wordpress Plugin) -->data-wfu-iddata-wfu-uploadurldata-wfu-maxfilesizedata-wfu-allowedtypesdata-wfu-buttontextdata-wfu-droptext+3 moreWFU_FrontendWFU_Adminwfu_paramswfu_ajax_object/wp-json/wpfileuploader/v1/upload/wp-json/wpfileuploader/v1/get_file_list[wordpress_file_upload]