cve/2024/CVE-2024-7559.md

18 lines
985 B
Markdown
Raw Permalink Normal View History

2024-08-24 17:55:21 +00:00
### [CVE-2024-7559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7559)
![](https://img.shields.io/static/v1?label=Product&message=File%20Manager%20Pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%208.3.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
The File Manager Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and capability checks in the mk_file_folder_manager AJAX action in all versions up to, and including, 8.3.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates