CVE-2021-25119

The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpsocket:automatic_grid_image_listing:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:54

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a - Exploit, Third Party Advisory

25 May 2022, 13:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 7.2
References (MISC) https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a - (MISC) https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a - Exploit, Third Party Advisory
CPE cpe:2.3:a:wpsocket:automatic_grid_image_listing:*:*:*:*:*:wordpress:*:*

16 May 2022, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-16 15:15

Updated : 2024-11-21 05:54


NVD link : CVE-2021-25119

Mitre link : CVE-2021-25119

CVE.ORG link : CVE-2021-25119


JSON object : View

Products Affected

wpsocket

  • automatic_grid_image_listing
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type