The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
References
Link | Resource |
---|---|
https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin/ | Exploit |
https://wordpress.org/plugins/user-submitted-posts/#developers | Product Release Notes |
https://www.wordfence.com/threat-intel/vulnerabilities/id/5a97877b-fb4d-4e87-bcff-56be65fee6ce?source=cve | Broken Link Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-06-07T01:51:22.056Z
Updated: 2023-06-07T01:51:22.056Z
Reserved: 2023-06-06T12:45:09.229Z
Link: CVE-2019-25138
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-07T02:15:09.963
Modified: 2023-11-07T03:09:21.093
Link: CVE-2019-25138
JSON object: View
Redhat Information
No data.
CWE