10
CVE-2020-35489
- EPSS 90.11%
- Veröffentlicht 17.12.2020 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:27:23
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Contact Form 7 <= 5.3.1 - Arbitrary File Upload via Bypass
The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows Unrestricted File Upload and remote code execution because a filename may contain special characters.
Mögliche Gegenmaßnahme
Contact Form 7: Update to version 5.3.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Contact Form 7
Version
[*, 5.3.2)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rocklobster ≫ Contact Form 7 SwPlatformwordpress Version < 5.3.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 90.11% | 0.996 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 10 | 3.9 | 6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.