Description
WordPress Plugin EditorMonkey is prone to a vulnerability that lets attackers upload arbitrary files because it fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin EditorMonkey version 2.5 is vulnerable; other versions may also be affected.
Remediation
Restrict access to test.html and browser.html (e.g. via .htaccess) or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/view/101421/wpeditormonkey-shell.txt
Related Vulnerabilities
Oracle Application Server CVE-2008-2583 Vulnerability (CVE-2008-2583)
WordPress Plugin Contact Form 7 Multi-Step Forms Security Bypass (3.0.8)
Apache HTTP Server CVE-2002-0392 Vulnerability (CVE-2002-0392)
Grafana Missing Authentication for Critical Function Vulnerability (CVE-2022-28660)
WordPress Plugin VikBooking Hotel Booking Engine & PMS Multiple Vulnerabilities (1.5.3)