Description
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Remediation
References
Related Vulnerabilities
WordPress Plugin 3D Product configurator for WooCommerce Arbitrary File Upload (1.5.531)
WordPress Plugin Slimstat Analytics Cross-Site Scripting (4.9.2)
Envoy Proxy Always-Incorrect Control Flow Implementation Vulnerability (CVE-2022-21655)
SeoPanel Cross-site Scripting (XSS) Vulnerability (CVE-2020-35930)