WordPress Plugin Vulnerabilities

SureMail < 1.9.1 - Unauthenticated Arbitrary File Upload

Description

The plugin is vulnerable to Unrestricted Upload of File with Dangerous Type due to the plugin's save_file() function in inc/emails/handler/uploads.php which duplicates all email attachments to a web-accessible directory (wp-content/uploads/suremails/attachments/) without validating file extensions or content types. Files are saved with predictable names derived from MD5 hashes of their content. While the plugin attempts to protect this directory with an Apache .htaccess file to disable PHP execution, this protection is ineffective on nginx, IIS, and Lighttpd servers, or on misconfigured Apache installations. This makes it possible for unauthenticated attackers to achieve Remote Code Execution by uploading malicious PHP files through any public form that emails attachments, calculating the predictable filename, and directly accessing the file to execute arbitrary code granted they are exploiting a site running on an affected web server configuration.

Affects Plugins

Fixed in 1.9.1

References

Miscellaneous

Original Researcher
type5afe
Verified
No

Timeline

Publicly Published
2025-12-01 (about 5 months ago)
Added
2025-12-08 (about 5 months ago)
Last Updated
2025-12-08 (about 5 months ago)

Other