Impact
The Slider Revolution plugin for WordPress has an inadequate file type validation in the _get_media_url and _check_file_path functions for versions 7.0.0 to 7.0.10. The flaw allows an attacker who can authenticate with subscriber‑level access or higher to upload arbitrary files, including executable content. If the uploaded file is executed by the web server, the attacker can achieve remote code execution on the host system, compromising confidentiality, integrity, and availability.
Affected Systems
Affected products are the Slider Revolution plugin for WordPress from the vendor Revolution Slider. The vulnerable range is version 7.0.0 through 7.0.10 inclusive. Versions 7.0.11 and later contain the fix.
Risk and Exploitability
The severity is high with a CVSS score of 8.8. The EPSS score is not available, so exploitation probability cannot be quantified, but the vulnerability is not currently listed in the CISA KEV catalog. The flaw requires authenticated access with at least subscriber rights, so an attacker would need to compromise a valid user account. Upon successful upload of a malicious file that the server can execute, the attacker could run arbitrary code with the permissions of the web server process, creating a full remote code execution condition.
OpenCVE Enrichment