Unrestricted File Upload Vulnerability in Aviary Image Editor Add-On for Gravity Forms
CVE-2015-4455
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 23 May 2017
Summary
The Aviary Image Editor Add-On for Gravity Forms features an unrestricted file upload vulnerability found in the includes/upload.php script. This flaw allows remote attackers to upload files with executable extensions. Once the file is uploaded, attackers can directly access it via a request to the file location in wp-content/uploads/gform_aviary, potentially leading to the execution of arbitrary code and compromising the security of the WordPress installation.
References
EPSS Score
47% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved