The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 | third party advisory exploit |
https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt | third party advisory |
https://wpvulndb.com/vulnerabilities/9697 |