WordPress Plugin Vulnerabilities
buddypress-xprofile-custom-fields-type 2.6.3 - Authenticated Arbitrary File Deletion
Description
Type user access: any user registered used in BuddyPress.
$_POST[ 'field_' . $field_id . '_hiddenfile' ] is not escaped.
$_POST[ 'field_' . $field_id . '_deleteimg' ] is not escaped.
Code
File: wp-conent/plugin/buddypress-xprofile-custom-fields-type/bp-xprofile-custom-fields-type.php Lines: 452, 472, 496, 513, 568, 579 Examples:
unlink( $uploads['basedir'] . $_POST[ 'field_' . $field_id . '_hiddenfile' ] );
unlink( $uploads['basedir'] . $_POST[ 'field_' . $field_id . '_hiddenimg' ] );
Proof of Concept
Affects Plugins
References
Classification
Type
RCE
OWASP top 10
CWE
Miscellaneous
Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2018-01-04 (about 8 years ago)
Added
2018-04-09 (about 8 years ago)
Last Updated
2020-04-15 (about 6 years ago)