← Zuruck zu CVEs
CVE-2020-36847
CRITICAL9.8
Beschreibung
The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/12/2025
Zuletzt geandert7/29/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
simplefilelist:simple_file_list
Schwachen (CWE)
CWE-434
Referenzen
https://packetstormsecurity.com/files/160221/(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/2286920/simple-file-list(security@wordfence.com)
https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/(security@wordfence.com)
https://www.cybersecurity-help.cz/vdb/SB2020042711(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cve(security@wordfence.com)
https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.