vulnerability
WordPress Plugin: user-private-files: CVE-2022-2356: Unrestricted Upload of File with Dangerous Type
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Jul 11, 2022 | May 15, 2025 | May 15, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Jul 11, 2022
Added
May 15, 2025
Modified
May 15, 2025
Description
The Frontend File Manager and Sharing – User Private Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_doc_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible under certain conditions. The plugin adds a Rewrite Rule to the site's .htaccess file in order to ensure that direct file access is not possible. However, deactivation of the plugin or resetting of the .htaccess file would lead to potential for Remote Code Execution. Servers other than Apache may ignore .htaccess files and be vulnerable to RCE.
Solution
user-private-files-plugin-cve-2022-2356

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.