CVE-2013-7102
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
23/12/2013
Last modified:
11/04/2025
Description
Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:optimizepress:optimizepress:*:-:-:*:-:wordpress:*:* | 1.60 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html
- http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update
- http://seclists.org/fulldisclosure/2013/Dec/127
- http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/
- http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html
- http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update
- http://seclists.org/fulldisclosure/2013/Dec/127
- http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/