Логотип exploitDog
bind:CVE-2020-25213
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-25213

Количество 3

Количество 3

nvd логотип

CVE-2020-25213

больше 5 лет назад

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

CVSS3: 10
EPSS: Критический
github логотип

GHSA-w774-7g7w-83fx

больше 3 лет назад

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2021-04175

больше 5 лет назад

Уязвимость плагина File Manager (wp-file-manager) системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный PHP код в целевой системе

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-25213

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

CVSS3: 10
94%
Критический
больше 5 лет назад
github логотип
GHSA-w774-7g7w-83fx

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

CVSS3: 9.8
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-04175

Уязвимость плагина File Manager (wp-file-manager) системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный PHP код в целевой системе

CVSS3: 9.8
94%
Критический
больше 5 лет назад

Уязвимостей на страницу