Description
WordPress Plugin ReFlex Gallery is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin ReFlex Gallery version 3.1.3 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.1.4 or latest
References
http://www.exploit-db.com/exploits/36374/
http://packetstormsecurity.com/files/130845/WordPress-Reflex-Gallery-3.1.3-Shell-Upload.html
https://github.com/googleinurl/Wordpress-Plugin-Reflex-Gallery-Arbitrary-File-Upload
http://packetstormsecurity.com/files/131515/WordPress-Reflex-Gallery-Upload.html
Related Vulnerabilities
WordPress Plugin Simple Ajax Shoutbox SQL Injection (2.2.1)
WordPress Plugin CiviCRM Security Bypass (5.35.1)
WordPress 5.9.x Multiple Vulnerabilities (5.9 - 5.9.4)
WordPress Plugin Fancy Product Designer-WooCommerce Cross-Site Scripting (3.4.1)
WordPress Plugin WordPress Photo Gallery by Gallery Bank Unspecified Vulnerability (3.1.26)