Files
CVEs-PoC/2012/CVE-2012-10026.md
T
2025-09-29 21:09:30 +02:00

20 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2012-10026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10026)
![](https://img.shields.io/static/v1?label=Product&message=Wordpress%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brightgreen)
### Description
The WordPress plugin Asset-Manager version 2.0 and below contains an unauthenticated arbitrary file upload vulnerability in upload.php. The endpoint fails to properly validate and restrict uploaded file types, allowing remote attackers to upload malicious PHP scripts to a predictable temporary directory. Once uploaded, the attacker can execute the file via a direct HTTP GET request, resulting in remote code execution under the web servers context.
### POC
#### Reference
- https://www.exploit-db.com/exploits/18993
- https://www.exploit-db.com/exploits/23652
- https://www.vulncheck.com/advisories/wordpress-plugin-asset-manager-php-file-upload
#### Github
No PoCs found on GitHub currently.