MailCWP <= 1.99 - Unauthenticated Arbitrary File Upload

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The code in mailcwp-upload.php  doesn't check that a user is authenticated or what type of file is being uploaded any user can upload a shell to the target WordPress server:

Exploitation requires the attacker to guess a writeable location in the http server root.

Affects

Plugin mailcwp
fixed in version 1.110

References

PACKETSTORM 132739
URL http://www.vapid.dhs.org/advisory.php?v=138

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website www.vapid.dhs.org
Submitter Twitter _larry0
Views 225
Verified No
WPVDB ID 8090

Timeline

Publicly Published 2015-07-10 (over 1 year ago)
Added 2015-07-11 (over 1 year ago)
Last Updated 2015-07-24 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.