Skip to main content

CVE-2020-25213

Description

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

NVD
Severity: CRITICAL
CVE ID: CVE-2020-25213
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
MITRE
Severity: CRITICAL
CVE ID: CVE-2020-25213
CVSS Score: 10.0
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2020-25213
mansoorr123
kakamband

CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit

Refrence: GitHub

forse01

Refrence: GitHub

0000000O0Oo

Will write a python script for exploiting this vulnerability

Refrence: GitHub

piruprohacking

Refrence: GitHub

b1ackros337

Refrence: GitHub

BLY-Coder

Python exploit for RCE in Wordpress

Refrence: GitHub

E1tex

Python Interactive Exploit for WP File Manager Vulnerability. The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension.

Refrence: GitHub

Nguyen-id

Refrence: GitHub

Content on GitHub

Aron-Tn | watchers:12

0day-elFinder-2020
Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )

Refrence: GitHub