The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2677722 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Apr 2022, 15:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CPE | cpe:2.3:a:iptanus:wordpress_file_upload_pro:*:*:*:*:*:wordpress:*:* cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
References | (CONFIRM) https://plugins.trac.wordpress.org/changeset/2677722 - Patch, Third Party Advisory | |
References | (MISC) https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 - Exploit, Third Party Advisory |
28 Mar 2022, 18:45
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-28 18:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-24962
Mitre link : CVE-2021-24962
CVE.ORG link : CVE-2021-24962
JSON object : View
Products Affected
iptanus
- wordpress_file_upload
- wordpress_file_upload_pro
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')