CVE-2020-24186

A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:14

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ - Exploit, Third Party Advisory () https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ - Exploit, Third Party Advisory

Information

Published : 2020-08-24 14:15

Updated : 2024-11-21 05:14


NVD link : CVE-2020-24186

Mitre link : CVE-2020-24186

CVE.ORG link : CVE-2020-24186


JSON object : View

Products Affected

gvectors

  • wpdiscuz
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type