Vulnerability Description
The UpdraftPlus plugin through 1.13.12 for WordPress allows remote PHP code execution because the plupload_action function in /wp-content/plugins/updraftplus/admin.php has a race condition before deleting a file associated with the name parameter. NOTE: the vendor reports that this does not cross a privilege boundary
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Updraftplus | Updraftplus | <= 1.13.12 |
Related Weaknesses (CWE)
References
- https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftExploitIssue TrackingThird Party Advisory
- https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2017-16871?
CVE-2017-16871 is a vulnerability with a CVSS score of 8.1 (HIGH). The UpdraftPlus plugin through 1.13.12 for WordPress allows remote PHP code execution because the plupload_action function in /wp-content/plugins/updraftplus/admin.php has a race condition before dele...
How severe is CVE-2017-16871?
CVE-2017-16871 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16871?
Check the references section above for vendor advisories and patch information. Affected products include: Updraftplus Updraftplus.