The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Simplefilelist
Simplefilelist simple File List |
|
CPEs | cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Simplefilelist
Simplefilelist simple File List |
Mon, 14 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Sat, 12 Jul 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server. | |
Title | Simple File List < 4.2.3 - Remote Code Execution | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-12T09:24:28.215Z
Updated: 2025-07-14T20:11:54.211Z
Reserved: 2025-07-11T21:23:42.099Z
Link: CVE-2020-36847

Updated: 2025-07-14T14:39:51.361Z

Status : Analyzed
Published: 2025-07-12T10:15:24.770
Modified: 2025-07-29T20:37:27.933
Link: CVE-2020-36847

No data.