In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/066ba5d4-4aaa-4462-b106-500c1f291c37 | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-04-05T18:27:43
Updated: 2021-04-05T18:27:43
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24160
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-05T19:15:15.107
Modified: 2021-04-08T19:25:41.600
Link: CVE-2021-24160
JSON object: View
Redhat Information
No data.
CWE