Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote malicious users to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
giulio ganci wp downloads manager 0.2 |
||
wordpress wp downloads manager 0.2 |