The Responsive Thumbnail Slider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type sanitization in the via the image uploader in versions up to 1.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected sites server using a double extension which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Jul 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress |
|
Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 25 Jul 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Responsive Thumbnail Slider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type sanitization in the via the image uploader in versions up to 1.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected sites server using a double extension which may make remote code execution possible. | |
Title | Responsive Thumbnail Slider < 1.0.1 - Authenticated (Subscriber+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-25T02:23:57.529Z
Updated: 2025-07-25T17:29:45.316Z
Reserved: 2025-07-24T14:08:30.177Z
Link: CVE-2015-10144

Updated: 2025-07-25T17:29:41.142Z

Status : Awaiting Analysis
Published: 2025-07-25T03:15:32.463
Modified: 2025-07-25T15:29:19.837
Link: CVE-2015-10144

No data.