Description
WordPress Plugin ReFlex Gallery is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin ReFlex Gallery version 3.1.3 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.1.4 or latest
References
http://www.exploit-db.com/exploits/36374/
http://packetstormsecurity.com/files/130845/WordPress-Reflex-Gallery-3.1.3-Shell-Upload.html
https://github.com/googleinurl/Wordpress-Plugin-Reflex-Gallery-Arbitrary-File-Upload
http://packetstormsecurity.com/files/131515/WordPress-Reflex-Gallery-Upload.html
Related Vulnerabilities
Nexus Repository Manager Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-43293)
PHP Improper Input Validation Vulnerability (CVE-2016-7417)
WordPress Plugin DukaPress TimThumb Arbitrary File Upload (2.3.2)
WordPress Plugin PowerPack Lite for Beaver Builder Local File Inclusion (1.3.0.3)
Contao Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10642)