The estatik plugin before 2.3.1 for WordPress has authenticated arbitrary file upload (exploitable with CSRF) via es_media_images[] to wp-admin/admin-ajax.php.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/estatik/#developers | Release Notes |
https://www.pluginvulnerabilities.com/2016/08/19/authenticated-arbitrary-file-upload-vulnerability-in-estatik/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/estatik/#developers | Release Notes |
https://www.pluginvulnerabilities.com/2016/08/19/authenticated-arbitrary-file-upload-vulnerability-in-estatik/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/estatik/#developers - Release Notes | |
References | () https://www.pluginvulnerabilities.com/2016/08/19/authenticated-arbitrary-file-upload-vulnerability-in-estatik/ - Exploit, Third Party Advisory |
Information
Published : 2019-09-16 13:15
Updated : 2024-11-21 02:45
NVD link : CVE-2016-10959
Mitre link : CVE-2016-10959
CVE.ORG link : CVE-2016-10959
JSON object : View
Products Affected
estatik
- estatik
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type