CVE-2020-25213
Description
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
Severity: CRITICAL
CVE ID: CVE-2020-25213
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL
CVE ID: CVE-2020-25213
CVSS Score: 10.0
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2020-25213
Refrence: Project Discovery GitHub
mansoorr123
kakamband
CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit
Refrence: GitHub
forse01
Refrence: GitHub
0000000O0Oo
Will write a python script for exploiting this vulnerability
Refrence: GitHub
piruprohacking
Refrence: GitHub
b1ackros337
Refrence: GitHub
BLY-Coder
Python exploit for RCE in Wordpress
Refrence: GitHub
E1tex
Python Interactive Exploit for WP File Manager Vulnerability. The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension.
Refrence: GitHub
Nguyen-id
Refrence: GitHub
Content on GitHub
Aron-Tn | watchers:12
0day-elFinder-2020
Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )
Refrence: GitHub