CVE-2020-36706
🔴 Łataj teraz
Brak walidacji typów plików w Simple:Press pozwala na zdalne przesyłanie dowolnych plików.
CVSS
9.8
EPSS
7.1%
Exploit
poc
Vendor
simple-press
Opis źródłowy (NVD)
The Simple:Press – WordPress Forum Plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ~/admin/resources/jscript/ajaxupload/sf-uploader.php file in versions up to, and including, 6.6.0. This makes it possible for attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 7.1% |
| Opublikowano (NVD) | 2023-10-20 07:15:14 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:17:07 UTC |
Referencje
- https://blog.nintechnet.com/wordpress-simplepress-plugin-fixed-critical-vulnerabilities/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://wpscan.com/vulnerability/27d4a8a5-9d81-4b42-92be-3f7d1ef22843 (security@wordfence.com) [Third Party Advisory]
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-simple-press-wordpress-forum-arbitrary-file-upload-6-6-0/ (security@wordfence.com) [Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/53eba5b4-7cc0-48e1-bb9c-6ed3207151ab?source=cve (security@wordfence.com) [Third Party Advisory]