CVE-2021-42362

Scores

EPSS

0.775medium77.5%
0%20%40%60%80%100%

Percentile: 77.5%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.5

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Description

The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-434

Exploits

Exploit ID: 50129

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50129

Exploit ID: CVE-2021-42362

Source: github-poc

URL: https://github.com/samiba6/CVE-2021-42362

Vulnerable Software (1)

Type: Configuration

Vendor: wordpress_popular_posts_project

Product: wordpress_popular_posts

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:wordpress_popular_posts_project:wordpress_popular_posts:*:*:*:*:*:wordpress:*:*",      "versionEndIncluding": "5.3.2",      "vulnerable": true ...

Source: nvd