Description
WordPress Plugin EditorMonkey is prone to a vulnerability that lets attackers upload arbitrary files because it fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin EditorMonkey version 2.5 is vulnerable; other versions may also be affected.
Remediation
Restrict access to test.html and browser.html (e.g. via .htaccess) or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/view/101421/wpeditormonkey-shell.txt
Related Vulnerabilities
WordPress Plugin File Manager Information Disclosure (6.4)
WordPress Plugin Visualizer:Tables and Charts Manager for WordPress Multiple Vulnerabilities (3.3.0)
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3225)
WordPress Plugin WP Photo Album Plus Cross-Site Scripting (5.0.10)