The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt | Third Party Advisory | 
| https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 | Exploit Third Party Advisory | 
| https://wpvulndb.com/vulnerabilities/9697 | |
| https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt | Third Party Advisory | 
| https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 | Exploit Third Party Advisory | 
| https://wpvulndb.com/vulnerabilities/9697 | 
Configurations
                    History
                    21 Nov 2024, 03:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt - Third Party Advisory | |
| References | () https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 - Exploit, Third Party Advisory | |
| References | () https://wpvulndb.com/vulnerabilities/9697 - | 
Information
                Published : 2018-07-02 17:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12426
Mitre link : CVE-2018-12426
CVE.ORG link : CVE-2018-12426
JSON object : View
Products Affected
                3cx
- live_chat
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
