Description
WordPress Plugin Enable Media Replace is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Enable Media Replace version 4.0.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 4.0.2 or latest
References
https://sploitus.com/exploit?id=WPEX-ID:B0239208-1E23-4774-9B8C-9611704A07A0
https://plugins.svn.wordpress.org/enable-media-replace/trunk/readme.txt
Related Vulnerabilities
WordPress 5.7.x Multiple Vulnerabilities (5.7 - 5.7.8)
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-2608)
WebLogic Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2020-28491)
WordPress Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-9066)
Moodle Incorrect Authorization Vulnerability (CVE-2020-14321)