Description
WordPress Plugin EditorMonkey is prone to a vulnerability that lets attackers upload arbitrary files because it fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin EditorMonkey version 2.5 is vulnerable; other versions may also be affected.
Remediation
Restrict access to test.html and browser.html (e.g. via .htaccess) or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/view/101421/wpeditormonkey-shell.txt