Description
Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor mobile-app-editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through <= 1.3.1.
Published: 2026-03-19
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via arbitrary file upload
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an attacker to upload a file of any type through the plugin’s upload interface. The upload mechanism does not enforce type restrictions, permitting a web‑shell file to be placed on the server. Deployment of such a file gives the attacker the ability to execute arbitrary commands on the web server, compromising confidentiality, integrity, and availability of the site.

Affected Systems

WordPress users running the Mobile App Editor plugin from the Syarif collection, versions up to and including 1.3.1, are affected.

Risk and Exploitability

The EPSS score is below 1% and the vulnerability is not listed in the KEV catalog, yet the impact is high because it enables remote code execution. An attacker could exploit the flaw simply by using the public upload feature of the plugin, likely without advanced prerequisites. The combination of unrestricted file upload and the ability to store a web shell creates a direct attack vector that, if used, can lead to full server compromise.

Generated by OpenCVE AI on April 28, 2026 at 22:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Mobile App Editor plugin to version 1.3.2 or newer.
  • If immediate upgrade is not feasible, temporarily disable the plugin’s upload feature or restrict its use to authenticated administrators only.
  • Deploy server‑side file type validation and block uploads of dangerous extensions (e.g., .php, .phtml, .pl, .cgi, .asp, .aspx, .exe, .sh) to prevent arbitrary files from being stored.

Generated by OpenCVE AI on April 28, 2026 at 22:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1. Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor mobile-app-editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through <= 1.3.1.
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Syarif
Syarif mobile App Editor
Wordpress
Wordpress wordpress
Vendors & Products Syarif
Syarif mobile App Editor
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1.
Title WordPress Mobile App Editor plugin <= 1.3.1 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Syarif Mobile App Editor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:15:01.331Z

Reserved: 2026-02-17T13:23:42.768Z

Link: CVE-2026-27067

cve-icon Vulnrichment

Updated: 2026-03-19T13:04:29.241Z

cve-icon NVD

Status : Deferred

Published: 2026-03-19T09:16:17.980

Modified: 2026-04-23T15:37:15.687

Link: CVE-2026-27067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T22:15:41Z

Weaknesses