Lucene search

K
wpvulndbJin HuangWPVDB-ID:8F24E74F-60E3-4100-9AB2-EC31B9C9CDEA
HistoryApr 08, 2021 - 12:00 a.m.

Imagements <= 1.2.5 - Unauthenticated Arbitrary File Upload to RCE

2021-04-0800:00:00
Jin Huang
wpscan.com
11
imagements wordpress plugin
arbitrary file upload
rce
unauthenticated attackers
content-type header
php file
cve-2021-24236
wordpress repository

EPSS

0.178

Percentile

96.2%

The Imagements WordPress plugin, versions <= 1.2.5, allowed images to be uploaded in comments, however, only checked for the Content-Type HTTP header for validation, which can be tampered with. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type header along with a PHP file, leading to Remote Code Execution (RCE). At the time of writing, the plugin had not been updated in over 8 years, and has been removed from the official WordPress repository. This vulnerability has been given CVE number CVE-2021-24236. As there plugin hasn’t been updated in 8 years and is no longer on the WordPress repository, it is highly recommended that it be removed as soon as possible and an alternative be found.

PoC

The PoC will be displayed once the issue has been remediated

EPSS

0.178

Percentile

96.2%

Related for WPVDB-ID:8F24E74F-60E3-4100-9AB2-EC31B9C9CDEA