CVE-2020-25213

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
References
Link Resource
http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html Exploit Third Party Advisory VDB Entry
https://github.com/w4fz5uck5/wp-file-manager-0day Exploit Third Party Advisory
https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html Third Party Advisory
https://plugins.trac.wordpress.org/changeset/2373068 Patch
https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ Exploit Third Party Advisory
https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/ Exploit Third Party Advisory
https://wordpress.org/plugins/wp-file-manager/#developers Product Release Notes
https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/ Press/Media Coverage
http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html Exploit Third Party Advisory VDB Entry
https://github.com/w4fz5uck5/wp-file-manager-0day Exploit Third Party Advisory
https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html Third Party Advisory
https://plugins.trac.wordpress.org/changeset/2373068 Patch
https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ Exploit Third Party Advisory
https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/ Exploit Third Party Advisory
https://wordpress.org/plugins/wp-file-manager/#developers Product Release Notes
https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/ Press/Media Coverage
Configurations

Configuration 1 (hide)

cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:17

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 10.0
References () http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/w4fz5uck5/wp-file-manager-0day - Exploit, Third Party Advisory () https://github.com/w4fz5uck5/wp-file-manager-0day - Exploit, Third Party Advisory
References () https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html - Third Party Advisory () https://hotforsecurity.bitdefender.com/blog/wordpress-websites-attacked-via-file-manager-plugin-vulnerability-24048.html - Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset/2373068 - Patch () https://plugins.trac.wordpress.org/changeset/2373068 - Patch
References () https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ - Exploit, Third Party Advisory () https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/ - Exploit, Third Party Advisory
References () https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/ - Exploit, Third Party Advisory () https://wordfence.com/blog/2020/09/700000-wordpress-users-affected-by-zero-day-vulnerability-in-file-manager-plugin/ - Exploit, Third Party Advisory
References () https://wordpress.org/plugins/wp-file-manager/#developers - Product, Release Notes () https://wordpress.org/plugins/wp-file-manager/#developers - Product, Release Notes
References () https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/ - Press/Media Coverage () https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/ - Press/Media Coverage

26 Jul 2024, 19:54

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html - () http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry
References () https://plugins.trac.wordpress.org/changeset/2373068 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2373068 - Patch
References () https://wordpress.org/plugins/wp-file-manager/#developers - Product, Third Party Advisory () https://wordpress.org/plugins/wp-file-manager/#developers - Product, Release Notes
References () https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/ - Press/Media Coverage, Third Party Advisory () https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/ - Press/Media Coverage

Information

Published : 2020-09-09 16:15

Updated : 2024-11-21 05:17


NVD link : CVE-2020-25213

Mitre link : CVE-2020-25213

CVE.ORG link : CVE-2020-25213


JSON object : View

Products Affected

webdesi9

  • file_manager
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type