CVE-2020-36847

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*

History

29 Jul 2025, 20:37

Type Values Removed Values Added
CPE cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*
First Time Simplefilelist simple File List
Simplefilelist
References () https://packetstormsecurity.com/files/160221/ - () https://packetstormsecurity.com/files/160221/ - Exploit
References () https://plugins.trac.wordpress.org/changeset/2286920/simple-file-list - () https://plugins.trac.wordpress.org/changeset/2286920/simple-file-list - Patch
References () https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/ - () https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/ - Exploit, Third Party Advisory
References () https://www.cybersecurity-help.cz/vdb/SB2020042711 - () https://www.cybersecurity-help.cz/vdb/SB2020042711 - Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cve - Third Party Advisory

15 Jul 2025, 13:14

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-12 10:15

Updated : 2025-07-29 20:37


NVD link : CVE-2020-36847

Mitre link : CVE-2020-36847

CVE.ORG link : CVE-2020-36847


JSON object : View

Products Affected

simplefilelist

  • simple_file_list
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type