The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
References
Link | Resource |
---|---|
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-42362 | Third Party Advisory |
https://wpscan.com/vulnerability/bd4f157c-a3d7-4535-a587-0102ba4e3009 | Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2542638/wordpress-popular-posts/trunk/src/Image.php | Patch Third Party Advisory |
https://blog.nintechnet.com/improper-input-validation-fixed-in-wordpress-popular-posts-plugin/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-11-17 10:15
Updated : 2021-12-21 12:23
NVD link : CVE-2021-42362
Mitre link : CVE-2021-42362
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
wordpress_popular_posts_project
- wordpress_popular_posts