CVE-2016-15033
🔴 Łataj teraz
Brak walidacji typów plików w wtyczce Delete All Comments umożliwia zdalne wykonanie kodu.
CVSS
9.8
EPSS
5.5%
Exploit
poc
Vendor
delete_all_comments_project
Opis źródłowy (NVD)
The Delete All Comments plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the via the delete-all-comments.php file in versions up to, and including, 2.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 5.5% |
| Opublikowano (NVD) | 2023-06-07 02:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:30 UTC |
Referencje
- http://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-delete-all-comments-plugin/ (security@wordfence.com) [Exploit]
- https://wordpress.org/plugins/delete-all-comments/#developers (security@wordfence.com) [Product]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e98d2d-20b1-4fff-96d4-0fb8e0d2615a?source=cve (security@wordfence.com) [Third Party Advisory]