CVE-2012-10027
Severity CVSS v4.0:
CRITICAL
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
05/08/2025
Last modified:
06/08/2025
Description
WP-Property plugin for WordPress through version 1.35.0 contains an unauthenticated file upload vulnerability in the third-party `uploadify.php` script. A remote attacker can upload arbitrary PHP files to a temporary directory without authentication, leading to remote code execution.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- http://web.archive.org/web/20150103065650/http://www.opensyscom.fr:80/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_property_upload_exec.rb
- https://wordpress.org/plugins/wp-property/
- https://www.exploit-db.com/exploits/18987
- https://www.exploit-db.com/exploits/23651
- https://www.vulncheck.com/advisories/wordpress-plugin-wp-property-php-file-upload
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_property_upload_exec.rb
- https://www.exploit-db.com/exploits/18987
- https://www.exploit-db.com/exploits/23651



