Description
WordPress Plugin Cherry is prone to multiple vulnerabilities, including arbitrary file upload and arbitrary file download vulnerabilities. An attacker can exploit these issues to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation, or to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Cherry version 1.2.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.2.7 or latest
References
https://github.com/CherryFramework/cherry-plugin/issues/6
https://whatisgon.wordpress.com/2015/07/16/cleaning-up-cherryframeworks-malware-installer/
Related Vulnerabilities
MediaWiki Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2021-44856)
WordPress Plugin Banner Cycler Cross-Site Request Forgery (1.4)
Magento Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-8155)
Citrix NetScaler Information Disclosure 'Citrix Bleed' (CVE-2023-4966)
Envoy Proxy Excessive Iteration Vulnerability (CVE-2021-32778)