The MapPress Maps for WordPress plugin before 2.73.13 allows a high privileged user to bypass the DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS settings and upload arbitrary files to the site through the "ajax_save" function. The file is written relative to the current 's stylesheet directory, and a .php file extension is added. No validation is performed on the content of the file, triggering an RCE vulnerability by uploading a web shell. Further the name parameter is not sanitized, allowing the payload to be uploaded to any directory to which the server has write access.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T23:32:46.208Z
Reserved: 2022-02-08T00:00:00
Link: CVE-2022-0537

No data.

Status : Modified
Published: 2022-04-04T16:15:09.363
Modified: 2024-11-21T06:38:52.007
Link: CVE-2022-0537

No data.