### [CVE-2022-26965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26965) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In Pluck 4.7.16, an admin user can use the theme upload functionality at /admin.php?action=themeinstall to perform remote code execution. ### POC #### Reference - https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html - https://youtu.be/sN6J_X4mEbY #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/SkDevilS/Pluck-Exploitation-by-skdevils - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/shikari00007/Pluck-CMS-Pluck-4.7.16-Theme-Upload-Remote-Code-Execution-Authenticated--POC - https://github.com/superlink996/chunqiuyunjingbachang