The WordPress plugin Asset-Manager version 2.0 and below contains an unauthenticated arbitrary file upload vulnerability in upload.php. The endpoint fails to properly validate and restrict uploaded file types, allowing remote attackers to upload malicious PHP scripts to a predictable temporary directory. Once uploaded, the attacker can execute the file via a direct HTTP GET request, resulting in remote code execution under the web server’s context.
CVSS
No CVSS.
References
Configurations
No configuration.
History
07 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () http://web.archive.org/web/20150106144832/http://www.opensyscom.fr:80/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html - | |
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb - | |
References | () https://www.exploit-db.com/exploits/18993 - | |
References | () https://www.exploit-db.com/exploits/23652 - |
05 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 20:15
Updated : 2025-08-07 15:15
NVD link : CVE-2012-10026
Mitre link : CVE-2012-10026
CVE.ORG link : CVE-2012-10026
JSON object : View
Products Affected
No product.
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type