Description
WordPress Plugin Xerte Online is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Xerte Online version 0.32 is vulnerable; other versions may also be affected.
Remediation
Update to plugin version 0.36 or latest
References
http://www.securityfocus.com/bid/57098/exploit
http://packetstormsecurity.com/files/119220/WordPress-Xerte-Online-0.32-Shell-Upload.html
Related Vulnerabilities
WordPress Plugin Pinterest 'Pin It' Button Multiple Unspecified Vulnerabilities (1.3.1)
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478)
WordPress Plugin Drag and Drop Multiple File Upload-Contact Form 7 Arbitrary File Upload (1.3.5.4)
Oracle JRE CVE-2023-21835 Vulnerability (CVE-2023-21835)
WordPress Plugin WP-Filebase Download Manager Multiple Unspecified Vulnerabilities (0.2.9.24)