Description
WordPress Plugin Keydatas is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Keydatas version 2.5.2 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.6.1 or latest
References
Related Vulnerabilities
WordPress Plugin Vuukle Comments, Reactions, Share Bar, Revenue Cross-Site Request Forgery (3.4.31)
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1455)
WordPress Plugin WordPress Download Manager Remote Code Execution (2.7.4)
WordPress Plugin Woocommerce-Recent Purchases Local File Inclusion (1.0.1)