Description
WordPress Plugin EditorMonkey is prone to a vulnerability that lets attackers upload arbitrary files because it fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin EditorMonkey version 2.5 is vulnerable; other versions may also be affected.
Remediation
Restrict access to test.html and browser.html (e.g. via .htaccess) or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/view/101421/wpeditormonkey-shell.txt
Related Vulnerabilities
WebLogic CVE-2022-21564 Vulnerability (CVE-2022-21564)
Oracle Database Server CVE-2008-2611 Vulnerability (CVE-2008-2611)
Moodle Incorrect Authorization Vulnerability (CVE-2024-48897)
SharePoint Improper Input Validation Vulnerability (CVE-2019-0957)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-6100)