logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-25213

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-25213

Description:
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
Last updated date:
07/26/2024

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
11/10/2020
Reference url to background

https://nvd.nist.gov/vuln/detail/CVE-2020-25213

Type:
exploitation
Confidence:
HIGH
Date of publishing:
07/23/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/10/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/10/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/10/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/10/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
11/13/2020
Reference url to background

https://github.com/kakamband/WPKiller

Type:
exploit
Confidence:
HIGH
Date of publishing:
08/27/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/01/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/22/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/26/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy