2 results (0.003 seconds)

CVSS: 6.6EPSS: %CPEs: 1EXPL: 0

The Media File Renamer: Rename Files (Manual, Auto & AI) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.7.7. This makes it possible for authenticated attackers, with administrator access and above, to execute code on the server by renaming files containing PHP code. • CWE-73: External Control of File Name or Path •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the (1) callback_multicheck, (2) callback_radio, and (3) callback_wysiwygin functions in mfrh_class.settings-api.php in the Media File Renamer plugin 1.7.0 for WordPress allow remote authenticated users with permissions to add media or edit media to inject arbitrary web script or HTML via unspecified parameters, as demonstrated by the title of an uploaded file. Múltiples vulnerabilidades de XSS en las funciones (1) callback_multicheck, (2) callback_radio y (3) callback_wysiwygin en mfrh_class.settings-api.php en el plugin Media File Renamer 1.7.0 para WordPress permiten a usuarios remotos autenticados con permisos para añadir medios o editar medios inyectar script Web o HTML arbitrarios a través de parámetros no especificados, tal y como fue demostrado por el título de un archivo cargado. WordPress Media File Renamer plugin version 1.7.0 suffers from a cross site scripting vulnerability. • http://www.securityfocus.com/archive/1/531270/100/0/threaded http://www.securityfocus.com/bid/65715 http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/index.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •