Description
WordPress Plugin WordPress File Upload is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery, information disclosure and remote code execution vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to perform certain administrative actions and gain unauthorized access to the affected application, to obtain sensitive information, to execute arbitrary code with the privileges of the user running the application, to compromise the application or the underlying database, to access or modify data or to compromise a vulnerable system. WordPress Plugin WordPress File Upload version 2.7.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.0.0 or latest
References
Related Vulnerabilities
PHP Use of Externally-Controlled Format String Vulnerability (CVE-2015-8617)
WordPress Plugin JH 404 Logger Cross-Site Scripting (1.1)
phpMyFAQ Improper Restriction of Excessive Authentication Attempts Vulnerability (CVE-2017-11187)
MongoDb Uncontrolled Resource Consumption Vulnerability (CVE-2016-3104)
Moment.js Uncontrolled Resource Consumption Vulnerability (CVE-2016-4055)