Description
WordPress Plugin Super Interactive Maps for WordPress is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Super Interactive Maps for WordPress version 1.9 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.0 or latest
References
https://packetstormsecurity.com/files/159627/WordPress-SuperStoreFinder-6.1-CSRF-Shell-Upload.html
https://www.youtube.com/watch?v=DQgmCYtUOhI
http://superstorefinder.net/support/forums/topic/security-patch-updates-post-penetration-test/
http://superstorefinder.net/support/forums/topic/patch-notes-super-interactive-maps/
Related Vulnerabilities
Ruby on Rails Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8166)
WordPress Plugin MAC PHOTO GALLERY 'upload-file.php' Arbitrary File Upload (2.7)
SharePoint CVE-2024-49068 Vulnerability (CVE-2024-49068)
phpMyAdmin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-2505)
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-14642)