The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
History

Tue, 29 Jul 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Simplefilelist
Simplefilelist simple File List
CPEs cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*
Vendors & Products Simplefilelist
Simplefilelist simple File List

Mon, 14 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00187}


Sat, 12 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
Title Simple File List < 4.2.3 - Remote Code Execution
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-07-12T09:24:28.215Z

Updated: 2025-07-14T20:11:54.211Z

Reserved: 2025-07-11T21:23:42.099Z

Link: CVE-2020-36847

cve-icon Vulnrichment

Updated: 2025-07-14T14:39:51.361Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-12T10:15:24.770

Modified: 2025-07-29T20:37:27.933

Link: CVE-2020-36847

cve-icon Redhat

No data.