Description
WordPress Plugin Downloads Manager is prone to a vulnerability that lets attackers upload and execute arbitrary code. This issue occurs because the application fails to sufficiently sanitize user-supplied input. Successfully exploiting this issue will allow attackers to upload and execute arbitrary PHP code within the context of the webserver process. This may allow an attacker to compromise the application and the underlying system; other attacks are also possible. WordPress Plugin Downloads Manager version 0.2 is vulnerable; other versions may also be affected.
Remediation
Update to the latest version
References
http://www.securityfocus.com/bid/30365/exploit
http://www.exploit-db.com/exploits/6127/
http://packetstormsecurity.com/files/view/68478/wordpressdm-upload.txt
Related Vulnerabilities
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-13663)
SharePoint Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2019-1202)
Ruby Improper Input Validation Vulnerability (CVE-2017-6181)
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2018-14720)