First published: Tue May 23 2017(Updated: )
Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gravity Forms | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4455 is considered a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2015-4455, update the Aviary Image Editor Add-on for Gravity Forms plugin to the latest version that addresses this vulnerability.
CVE-2015-4455 allows for arbitrary code execution through unrestricted file uploads, enabling attackers to upload and execute malicious files.
CVE-2015-4455 affects version 3.0 beta and below of the Aviary Image Editor Add-on for Gravity Forms plugin.
Yes, there are known exploits for CVE-2015-4455 that allow attackers to exploit the file upload functionality to run arbitrary code.