A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
References
Link | Resource |
---|---|
https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-08-24 07:15
Updated : 2022-01-01 10:46
NVD link : CVE-2020-24186
Mitre link : CVE-2020-24186
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
gvectors
- wpdiscuz