Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-30797 | The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 29 Jul 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simplefilelist
Simplefilelist simple File List |
|
| CPEs | cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Simplefilelist
Simplefilelist simple File List |
Mon, 14 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Sat, 12 Jul 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server. | |
| Title | Simple File List < 4.2.3 - Remote Code Execution | |
| Weaknesses | CWE-434 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-07-14T20:11:54.211Z
Reserved: 2025-07-11T21:23:42.099Z
Link: CVE-2020-36847
Updated: 2025-07-14T14:39:51.361Z
Status : Analyzed
Published: 2025-07-12T10:15:24.770
Modified: 2025-07-29T20:37:27.933
Link: CVE-2020-36847
No data.
OpenCVE Enrichment
No data.
EUVD