Loading HuntDB...

GHSA-8xp7-p66p-4h9h

GitHub Security Advisory

⚠ Unreviewed CRITICAL Has CVE

Advisory Details

An unrestricted file upload vulnerability in the WordPress Simple File List plugin prior to version 4.2.3 allows unauthenticated remote attackers to achieve remote code execution. The plugin's upload endpoint (ee-upload-engine.php) restricts file uploads based on extension, but lacks proper validation after file renaming. An attacker can first upload a PHP payload disguised as a .png file, then use the plugin’s ee-file-engine.php rename functionality to change the extension to .php. This bypasses upload restrictions and results in the uploaded payload being executable on the server.

Related CVEs

Key Information

GHSA ID
GHSA-8xp7-p66p-4h9h
Published
July 9, 2025 3:30 AM
Last Modified
July 16, 2025 6:32 PM
CVSS Score
9.0 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: July 26, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.