Description
WordPress Plugin Cherry is prone to multiple vulnerabilities, including arbitrary file upload and arbitrary file download vulnerabilities. An attacker can exploit these issues to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation, or to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Cherry version 1.2.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.2.7 or latest
References
https://github.com/CherryFramework/cherry-plugin/issues/6
https://whatisgon.wordpress.com/2015/07/16/cleaning-up-cherryframeworks-malware-installer/
Related Vulnerabilities
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-45038)
Oracle Database Server CVE-2014-4289 Vulnerability (CVE-2014-4289)
Atlassian Jira Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2021-41306)
WordPress Plugin Personalized WooCommerce Cart Page Cross-Site Request Forgery (2.4)