Description
WordPress Plugin Fast Image Adder is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Fast Image Adder version 1.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.vapidlabs.com/advisory.php?v=139
http://www.openwall.com/lists/oss-security/2015/07/17/8
http://seclists.org/oss-sec/2015/q3/136
https://packetstormsecurity.com/files/132958/WordPress-Fast-Image-Adder-1.1-Shell-Upload.html
Related Vulnerabilities
IBM WebSEAL Insertion of Sensitive Information into Log File Vulnerability (CVE-2017-1480)
Poll, Survey, Form & Quiz Maker by OpinionStage Cross-Site Scripting (19.6.24)
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2020-13950)
Joomla! Core 3.x.x Cross-Site Request Forgery (3.2.0 - 3.9.12)