Description
Zen Cart 1.3.8a, 1.3.8, and earlier does not require administrative authentication for admin/record_company.php, which allows remote attackers to execute arbitrary code by uploading a .php file via the record_company_image parameter in conjunction with a PATH_INFO of password_forgotten.php, then accessing this file via a direct request to the file in images/.
Remediation
References
Related Vulnerabilities
WordPress Plugin Indexisto WordPress Site Search Cross-Site Scripting (1.0.5)
PHP Improper Input Validation Vulnerability (CVE-2016-10397)
WordPress Plugin UserPro-Community and User Profile Cross-Site Scripting (4.9.23)
Jenkins Session Fixation Vulnerability (CVE-2018-1000409)
WordPress Plugin Image Export Arbitrary File Download (1.1.0)