CVE-2025-34085: WordPress Simple File List <=4.2.2 - Remote Code Execution

CVE-2025-34085: WordPress Simple File List <=4.2.2 - Remote Code Execution-渗透云记 - 专注于网络安全与技术分享
CVE-2025-34085: WordPress Simple File List <=4.2.2 - Remote Code Execution
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2025-34085: wordpress Simple File List <=4.2.2 – Remote Code Execution

漏洞描述

An unrestricted file upload vulnerability in the WordPress Simple File List plugin before version 4.2.3 allows unauthenticated remote attackers to achieve remote code execution. The plugin's upload endpoint (ee-upload-engine.php) restricts file uploads based on extension, but lacks proper validation after file renaming. An attacker can first upload a PHP payload disguised as a .png file, then use the plugin’s ee-file-engine.php rename functionality to change the extension to .php. This bypasses upload restrictions and results in the uploaded payload being executable on the server.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享