CVE-2020-36705
🔴 Łataj teraz
Brak walidacji typów plików w wtyczce Adning Advertising dla WordPressa umożliwia zdalne wykonanie kodu.
CVSS
9.8
EPSS
89.5%
Exploit
poc
Vendor
tunasite
Opis źródłowy (NVD)
The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 89.5% |
| Opublikowano (NVD) | 2023-06-07 13:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:17:07 UTC |
Referencje
- https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/ (security@wordfence.com) [Third Party Advisory]
- https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693 (security@wordfence.com) [Product]
- https://wpscan.com/vulnerability/e9873fe3-fc06-4a52-aa32-6922cab7830c (security@wordfence.com) [Third Party Advisory]
- https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4a263b74-e9ae-4fd2-be9b-9b8e9eee5982?source=cve (security@wordfence.com) [Third Party Advisory]