Description
WordPress Plugin Xerte Online is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Xerte Online version 0.32 is vulnerable; other versions may also be affected.
Remediation
Update to plugin version 0.36 or latest
References
http://www.securityfocus.com/bid/57098/exploit
http://packetstormsecurity.com/files/119220/WordPress-Xerte-Online-0.32-Shell-Upload.html
Related Vulnerabilities
MySQL CVE-2024-21204 Vulnerability (CVE-2024-21204)
WordPress Plugin WP Database Backup Unspecified Vulnerability (4.1)
XWikiplatform Missing Authorization Vulnerability (CVE-2024-37898)
Drupal Core 5.x SQL Injection (5.0 - 5.14)
Undertow Uncontrolled Resource Consumption Vulnerability (CVE-2022-2053)