The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2677722 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-03-28 18:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-24962
Mitre link : CVE-2021-24962
CVE.ORG link : CVE-2021-24962
JSON object : View
Products Affected
iptanus
- wordpress_file_upload
- wordpress_file_upload_pro
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')