The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2021-06-21T19:18:22
Updated: 2024-08-03T19:28:23.812Z
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24376
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-06-21T20:15:09.050
Modified: 2024-11-21T05:52:56.727
Link: CVE-2021-24376
Redhat
No data.