CVE-2021-24962

The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:iptanus:wordpress_file_upload_pro:*:*:*:*:*:wordpress:*:*

History

04 Apr 2022, 15:37

Type Values Removed Values Added
CWE CWE-22
CPE cpe:2.3:a:iptanus:wordpress_file_upload_pro:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
References (CONFIRM) https://plugins.trac.wordpress.org/changeset/2677722 - (CONFIRM) https://plugins.trac.wordpress.org/changeset/2677722 - Patch, Third Party Advisory
References (MISC) https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 - (MISC) https://wpscan.com/vulnerability/7a95b3f2-285e-40e3-aead-41932c207623 - Exploit, Third Party Advisory

28 Mar 2022, 18:45

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-28 18:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-24962

Mitre link : CVE-2021-24962

CVE.ORG link : CVE-2021-24962


JSON object : View

Products Affected

iptanus

  • wordpress_file_upload
  • wordpress_file_upload_pro
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')