CVE-2025-4279 in External Image Replace Plugin情報

要約 (英語)

The External image replace plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'external_image_replace_get_posts::replace_post' function in all versions up to, and including, 1.0.8. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

予約する

2025年05月05日

公開

2025年05月05日

ステータス

確認済み

エントリ

VulDB provides additional information and datapoints for this CVE:

ソース

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!