CVE-2021-4382
🟠 Łataj w tym tygodniu
Brak walidacji typów plików w wtyczce Recently dla WordPressa umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
10.6%
Exploit
none
Vendor
recently_project
Opis źródłowy (NVD)
The Recently plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the fetch_external_image() function in versions up to, and including, 3.0.4. This makes it possible for authenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 10.6% |
| Opublikowano (NVD) | 2023-06-07 02:15:15 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:43 UTC |
Referencje
- https://plugins.trac.wordpress.org/changeset/2542693 (security@wordfence.com) [Release Notes]
- https://wpscan.com/vulnerability/92c3f26a-1a84-459a-874b-07dc83c9f42a (security@wordfence.com) [Third Party Advisory]
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-recently-multiple-vulnerabilities-3-0-4/ (security@wordfence.com) [Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f8297149-2de3-4e49-80f9-6ea59dea6bce?source=cve (security@wordfence.com) [Third Party Advisory]