A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
References
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ - Exploit, Third Party Advisory |
01 Jan 2022, 18:46
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jun 2021, 19:55
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry |
08 Jun 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Jun 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-08-24 14:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24186
Mitre link : CVE-2020-24186
CVE.ORG link : CVE-2020-24186
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type