CVE-2020-36847

| EUVD-2020-30797 CRITICAL
2025-07-12 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 16, 2026 - 08:56 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:56 euvd
EUVD-2020-30797
Patch Released
Mar 16, 2026 - 08:56 nvd
Patch available
PoC Detected
Jul 29, 2025 - 20:37 vuln.today
Public exploit code
CVE Published
Jul 12, 2025 - 10:15 nvd
CRITICAL 9.8

Description

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

Analysis

The Simple File List plugin for WordPress through version 4.2.2 contains an unauthenticated remote code execution vulnerability. Attackers can upload PHP files disguised with image extensions and then rename them back to .php using the plugin's built-in rename functionality, bypassing all upload restrictions.

Technical Context

The plugin allows file uploads with extension validation that blocks .php files. However, the rename function is accessible without authentication and performs no extension checks. An attacker uploads a PHP webshell with a .png extension (passing upload validation), then sends a rename request to change the extension from .png to .php. The file is now executable and accessible via the web.

Affected Products

['Simple File List <= 4.2.2', 'Simple File List Pro (same versions)']

Remediation

Update to Simple File List 4.2.3 or later. Configure the web server to deny PHP execution in the plugin's upload directory. Review the upload directory for suspicious PHP files. Add authentication requirements to file management operations.

Priority Score

155
Low Medium High Critical
KEV: 0
EPSS: +86.1
CVSS: +49
POC: +20

Share

CVE-2020-36847 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy