7.2
CVE-2021-25119
- EPSS 0.91%
- Veröffentlicht 16.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:23
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
AGIL(Automatic Grid Image Listing) <= 1.0 - Arbitrary File Upload
The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
Mögliche Gegenmaßnahme
AGIL(Automatic Grid Image Listing): No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
AGIL(Automatic Grid Image Listing)
Version
* - 1.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpsocket ≫ Automatic Grid Image Listing SwPlatformwordpress Version <= 1.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.91% | 0.751 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.