The wp_ajax_upload-remote-file AJAX action of the External Media WordPress plugin before 1.0.34 was vulnerable to arbitrary file uploads via any authenticated users.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/4fb90999-6f91-4200-a0cc-bfe9b34a5de9 | third party advisory exploit |
https://www.wordfence.com/blog/2021/05/critical-vulnerability-patched-in-external-media-plugin/ | third party advisory exploit |