CVE-2019-25138
🔴 Łataj teraz
Brak walidacji typów plików w wtyczce User Submitted Posts dla WordPressa umożliwia zdalne wykonanie kodu.
CVSS
9.8
EPSS
5.5%
Exploit
poc
Vendor
plugin-planet
Opis źródłowy (NVD)
The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 5.5% |
| Opublikowano (NVD) | 2023-06-07 02:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:17:02 UTC |
Referencje
- https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin/ (security@wordfence.com) [Exploit]
- https://wordpress.org/plugins/user-submitted-posts/#developers (security@wordfence.com) [Product, Release Notes]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5a97877b-fb4d-4e87-bcff-56be65fee6ce?source=cve (security@wordfence.com) [Broken Link, Third Party Advisory]