Description
HS Brand Logo Slider 2.1 contains an unrestricted file upload vulnerability that allows authenticated users to bypass client-side file extension validation by uploading arbitrary files. Attackers can intercept upload requests to the logoupload parameter in the admin interface and rename files to executable extensions .php to achieve remote code execution.
Published: 2026-05-16
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

HS Brand Logo Slider 2.1 allows authenticated WordPress administrators to upload arbitrary files by bypassing client‑side validation on the logoupload parameter. An attacker can rename the uploaded file to a .php extension and submit it, resulting in PHP code execution on the server. The weakness is an instance of Unrestricted File Upload (CWE‑434) and can compromise confidentiality, integrity, and availability of the affected site.

Affected Systems

The vulnerability affects all WordPress sites that have Heliossolutions' HS Brand Logo Slider plugin version 2.1 installed. No other vendors or product versions are listed as impacted.

Risk and Exploitability

The CVSS score of 8.7 reflects a high severity level. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, meaning it has not been officially reported as a known exploit yet. However, the attacker must have administrative privileges to the WordPress backend to perform the upload, which limits the attack surface to authenticated users. Because the flaw enables remote code execution with moderate effort, the risk remains significant for sites running the vulnerable plugin.

Generated by OpenCVE AI on May 16, 2026 at 16:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HS Brand Logo Slider to the latest version that includes proper file type validation or uninstall the plugin if no fix is available.
  • Restrict WordPress admin access so that only trusted users can upload media, and disable the upload feature for the slider plugin if it can be deactivated.
  • Apply a server‑side restriction to the uploads directory to block execution of files with PHP extensions—for example, by adding a .htaccess rule such as "<Files *.php> deny from all </Files>" or by configuring the web server to treat uploaded files as non‑executable.
  • Regularly audit the uploads directory and monitor for unexpected PHP files to detect any attempts to exploit the upload mechanism.

Generated by OpenCVE AI on May 16, 2026 at 16:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description HS Brand Logo Slider 2.1 contains an unrestricted file upload vulnerability that allows authenticated users to bypass client-side file extension validation by uploading arbitrary files. Attackers can intercept upload requests to the logoupload parameter in the admin interface and rename files to executable extensions .php to achieve remote code execution.
Title WordPress Plugin HS Brand Logo Slider 2.1 Unrestricted File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:25:45.310Z

Reserved: 2026-05-15T13:25:19.369Z

Link: CVE-2020-37227

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:17.713

Modified: 2026-05-16T16:16:17.713

Link: CVE-2020-37227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T16:45:27Z

Weaknesses