Description
WordPress Plugin PitchPrint is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin PitchPrint versions 7.1 and 7.1.1 are vulnerable.
Remediation
Update to plugin version 7.2.0 or latest
References
Related Vulnerabilities
WordPress Plugin Rekt Slideshow TimThumb Arbitrary File Upload (1.0.5)
WordPress Plugin WooCommerce PayU India (PayUmoney-PayUbiz) Parameter Tampering (2.1.1)
WordPress Plugin WooCommerce Potential PHP Object Injection (3.4.4)
Ruby on Rails Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-5419)
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1835)