Files
CVEs-PoC/2012/CVE-2012-10027.md
T
2025-09-29 21:09:30 +02:00

20 lines
960 B
Markdown

### [CVE-2012-10027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10027)
![](https://img.shields.io/static/v1?label=Product&message=WordPress%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brightgreen)
### Description
WP-Property plugin for WordPress through version 1.35.0 contains an unauthenticated file upload vulnerability in the third-party `uploadify.php` script. A remote attacker can upload arbitrary PHP files to a temporary directory without authentication, leading to remote code execution.
### POC
#### Reference
- https://www.exploit-db.com/exploits/18987
- https://www.exploit-db.com/exploits/23651
- https://www.vulncheck.com/advisories/wordpress-plugin-wp-property-php-file-upload
#### Github
No PoCs found on GitHub currently.