vendor:
Buddypress Xprofile Custom Fields Type
by:
Lenon Leite
8.8
CVSS
HIGH
Remote Code Execution
79
CWE
Product Name: Buddypress Xprofile Custom Fields Type
Affected Version From: 2.6.3
Affected Version To: 2.6.3
Patch Exists: NO
Related CWE: N/A
CPE: a:wordpress:buddypress_xprofile_custom_fields_type:2.6.3
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 16.1
2018
Plugin Buddypress Xprofile Custom Fields Type 2.6.3 RCE – Unlink
A vulnerability exists in the Plugin Buddypress Xprofile Custom Fields Type 2.6.3, where the $_POST[ 'field_' . $field_id . '_hiddenfile' ] and $_POST[ 'field_' . $field_id . '_deleteimg' ] parameters are not escaped, allowing an attacker to execute arbitrary code. An attacker can exploit this vulnerability by logging in as a regular user, accessing the Edit Profile page, registering data with an image, and then changing the parameter to delete the image in the HTML and saving the profile.
Mitigation:
Ensure that all user-supplied input is properly sanitized and validated before being used in any application logic.