CVE-2025-4279 in External Image Replace Plugin
要約 (英語)
The External image replace plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'external_image_replace_get_posts::replace_post' function in all versions up to, and including, 1.0.8. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
予約する
2025年05月05日
公開
2025年05月05日
ステータス
確認済み
エントリ
VulDB provides additional information and datapoints for this CVE:
| 識別子 | 脆弱性 | CWE | 悪用可 | 対策 | CVE |
|---|---|---|---|---|---|
| 307387 | External Image Replace Plugin replace_post 特権昇格 | 434 | 未定義 | 未定義 | CVE-2025-4279 |