The Iptanus WordPress File Upload plugin before 4.3.3 for WordPress mishandles shortcode attributes.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wp-file-upload/#developers | Third Party Advisory |
| https://www.exploit-db.com/exploits/44443/ | Exploit Third Party Advisory VDB Entry |
| https://www.iptanus.com/new-version-4-3-3-of-wordpress-file-upload-plugin/ | Vendor Advisory |
| https://wordpress.org/plugins/wp-file-upload/#developers | Third Party Advisory |
| https://www.exploit-db.com/exploits/44443/ | Exploit Third Party Advisory VDB Entry |
| https://www.iptanus.com/new-version-4-3-3-of-wordpress-file-upload-plugin/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wordpress.org/plugins/wp-file-upload/#developers - Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/44443/ - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.iptanus.com/new-version-4-3-3-of-wordpress-file-upload-plugin/ - Vendor Advisory |
Information
Published : 2018-04-01 23:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9172
Mitre link : CVE-2018-9172
CVE.ORG link : CVE-2018-9172
JSON object : View
Products Affected
iptanus
- wordpress_file_upload
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
