Description
Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow Photo Engine wplr-sync allows Upload a Web Shell to a Web Server.This issue affects Photo Engine: from n/a through <= 6.4.9.
Published: 2026-03-25
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate patch
AI Analysis

Impact

The vulnerability allows arbitrary files, including executable web shells, to be uploaded through the Photo Engine plugin’s upload interface. Once a malicious file is stored on the server, the attacker can execute code with the privileges of the web application, compromising confidentiality, integrity, and availability of the affected site.

Affected Systems

All installations of Jordy Meow Photo Engine (wplr-sync) up to and including version 6.4.9 are exposed. No lower bound is documented, meaning every instance running a version at or below 6.4.9 is considered vulnerable.

Risk and Exploitability

The base score of 9.1 signals critical severity, and the exploit probability is reported to be below 1%. The vulnerability is not listed in the known exploited vulnerabilities catalog. The likely attack vector is remote, via the plugin’s upload functionality; an attacker with web access can upload a malicious file without the need for privileged authentication, after which remote code execution follows.

Generated by OpenCVE AI on March 26, 2026 at 20:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Photo Engine plugin to version 6.5 or later, which removes the unrestricted upload flaw.
  • As an interim measure, configure the web server (e.g., .htaccess or nginx rules) to block the upload of executable file types such as .php, .php5, .phtml, .pl, and .py.
  • Restrict the plugin’s upload capability to administrator accounts only, disabling it for untrusted or guest users.
  • Regularly review the upload directory and application logs for suspicious files and respond promptly if any are detected.
  • Apply the principle of least privilege to the web application to limit the impact should an attacker succeed.

Generated by OpenCVE AI on March 26, 2026 at 20:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Jordy Meow
Jordy Meow photo Engine
Wordpress
Wordpress wordpress
Vendors & Products Jordy Meow
Jordy Meow photo Engine
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow Photo Engine wplr-sync allows Upload a Web Shell to a Web Server.This issue affects Photo Engine: from n/a through <= 6.4.9.
Title WordPress Photo Engine plugin <= 6.4.9 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References

Subscriptions

Jordy Meow Photo Engine
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-26T18:35:56.992Z

Reserved: 2026-03-12T11:12:19.946Z

Link: CVE-2026-32524

cve-icon Vulnrichment

Updated: 2026-03-26T18:34:38.525Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:17:05.393

Modified: 2026-03-30T13:27:12.923

Link: CVE-2026-32524

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:30:43Z

Weaknesses