8.8
CVE-2015-10144
- EPSS 0.58%
- Veröffentlicht 25.07.2025 03:15:32
- Zuletzt bearbeitet 16.12.2025 14:57:31
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Responsive Thumbnail Slider < 1.0.1 - Authenticated (Subscriber+) Arbitrary File Upload
The Responsive Thumbnail Slider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type sanitization in the via the image uploader in versions up to 1.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected sites server using a double extension which may make remote code execution possible.
Mögliche Gegenmaßnahme
Thumbnail carousel slider: Update to version 1.0.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Thumbnail carousel slider
Version
[*, 1.0.1)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
I13websolution ≫ Thumbnail Carousel Slider SwPlatformwordpress Version <= 1.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.58% | 0.684 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.