MailCWP 1.100 - Unauthenticated Arbitrary File UploadSign up to our free email alerts service for instant vulnerability notifications!
The code in mailcwp-upload.php doesn't check that a user is authenticated or what type of file is being uploaded any user can upload a shell to the target WordPress server: Exploitation requires the attacker to guess a writeable location in the http server root.
fixed in version 1.110
|Submitter||Larry W. Cashdollar|
|Publicly Published||2015-07-10 (about 2 years ago)|
|Added||2015-07-11 (about 2 years ago)|
|Last Updated||2016-12-14 (7 months ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|