The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a - Exploit, Third Party Advisory |
Information
Published : 2022-05-16 15:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25119
Mitre link : CVE-2021-25119
CVE.ORG link : CVE-2021-25119
JSON object : View
Products Affected
wpsocket
- automatic_grid_image_listing
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type