The Simple Schools Staff Directory WordPress plugin through 1.1 does not validate uploaded logo pictures to ensure that are indeed images, allowing high privilege users such as admin to upload arbitrary file like PHP, leading to RCE
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/8b5b5b57-50c5-4cd8-9171-168c3e9df46a - Exploit, Third Party Advisory |
Information
Published : 2021-09-20 10:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24663
Mitre link : CVE-2021-24663
CVE.ORG link : CVE-2021-24663
JSON object : View
Products Affected
simple_schools_staff_directory_project
- simple_schools_staff_directory
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type