CVE-2021-24962

The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:iptanus:wordpress_file_upload_pro:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:54

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/2677722 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2677722 - Patch, Third Party Advisory
References () https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 - Exploit, Third Party Advisory

Information

Published : 2022-03-28 18:15

Updated : 2024-11-21 05:54


NVD link : CVE-2021-24962

Mitre link : CVE-2021-24962

CVE.ORG link : CVE-2021-24962


JSON object : View

Products Affected

iptanus

  • wordpress_file_upload_pro
  • wordpress_file_upload
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')