Description
WordPress Plugin Fast Image Adder is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Fast Image Adder version 1.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.vapidlabs.com/advisory.php?v=139
http://www.openwall.com/lists/oss-security/2015/07/17/8
http://seclists.org/oss-sec/2015/q3/136
https://packetstormsecurity.com/files/132958/WordPress-Fast-Image-Adder-1.1-Shell-Upload.html
Related Vulnerabilities
WordPress 5.5.x Prototype Pollution (5.5 - 5.5.8)
MySQL CVE-2022-21444 Vulnerability (CVE-2022-21444)
WordPress Plugin Drag and Drop Multiple File Upload-Contact Form 7 Cross-Site Scripting (1.3.6.2)
WordPress Plugin Twitter Feed:Embedded Timeline 'url' Parameter Cross-Site Scripting (0.3.1)
Oracle Database Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1675)