First published: Wed Oct 16 2024(Updated: )
The WordPress Mega Menu plugin for WordPress is vulnerable to Arbitrary File Creation in versions up to, and including, 2.0.6 via the compiler_save AJAX action. This makes it possible for unauthenticated attackers to create arbitrary PHP files that can be used to execute malicious code.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Mega Menu – QuadMenu | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4443 is considered high severity due to its potential for unauthenticated attackers to create arbitrary PHP files.
To fix CVE-2021-4443, update the WordPress Mega Menu plugin to version 2.0.7 or later.
CVE-2021-4443 affects all versions of the WordPress Mega Menu plugin up to and including 2.0.6.
CVE-2021-4443 allows for arbitrary file creation, leading to potential remote code execution by attackers.
No, CVE-2021-4443 can be exploited by unauthenticated attackers, making it particularly dangerous.