The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2677722 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2677722 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/2677722 - Patch, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 - Exploit, Third Party Advisory |
Information
Published : 2022-03-28 18:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-24962
Mitre link : CVE-2021-24962
CVE.ORG link : CVE-2021-24962
JSON object : View
Products Affected
iptanus
- wordpress_file_upload_pro
- wordpress_file_upload
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')