Description
WordPress Plugin Downloads Manager is prone to a vulnerability that lets attackers upload and execute arbitrary code. This issue occurs because the application fails to sufficiently sanitize user-supplied input. Successfully exploiting this issue will allow attackers to upload and execute arbitrary PHP code within the context of the webserver process. This may allow an attacker to compromise the application and the underlying system; other attacks are also possible. WordPress Plugin Downloads Manager version 0.2 is vulnerable; other versions may also be affected.
Remediation
Update to the latest version
References
http://www.securityfocus.com/bid/30365/exploit
http://www.exploit-db.com/exploits/6127/
http://packetstormsecurity.com/files/view/68478/wordpressdm-upload.txt
Related Vulnerabilities
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15730)
Jenkins Incorrect Default Permissions Vulnerability (CVE-2023-43496)
WordPress Plugin Import all XML, CSV & TXT into WordPress Cross-Site Request Forgery (5.6)
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-24407)