Vulnerability Details : CVE-2015-4133
Public exploit exists!
Unrestricted file upload vulnerability in admin/scripts/FileUploader/php.php in the ReFlex Gallery plugin before 3.1.4 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in uploads/ directory.
Exploit prediction scoring system (EPSS) score for CVE-2015-4133
Probability of exploitation activity in the next 30 days: 85.69%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2015-4133
-
Wordpress Reflex Gallery Upload Vulnerability
Disclosure Date: 2012-12-30First seen: 2020-04-26exploit/unix/webapp/wp_reflexgallery_file_uploadThis module exploits an arbitrary PHP code upload in the WordPress Reflex Gallery version 3.1.3. The vulnerability allows for arbitrary file upload and remote code execution. Authors: - Unknown - Roberto Soares Espreto <robertoespreto@gmail.com>
CVSS scores for CVE-2015-4133
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2015-4133
-
http://www.securityfocus.com/bid/57100
WordPress ReFlex Gallery Plugin 'php.php' Arbitrary File Upload Vulnerability
-
https://www.exploit-db.com/exploits/36809/
WordPress Plugin Reflex Gallery - Arbitrary File Upload (Metasploit)Exploit
-
http://packetstormsecurity.com/files/131515/
WordPress Reflex Gallery Upload โ Packet StormExploit
-
https://wordpress.org/plugins/reflex-gallery/changelog/
ReFlex Gallery ยป WordPress Photo Gallery โ WordPress plugin | WordPress.orgPatch
-
http://packetstormsecurity.com/files/130845/
WordPress Reflex Gallery 3.1.3 Shell Upload โ Packet StormExploit
-
https://wpvulndb.com/vulnerabilities/7867
Reflex Gallery <= 3.1.3 - Arbitrary File Upload
Products affected by CVE-2015-4133
- cpe:2.3:a:reflex_gallery_project:reflex_gallery:*:*:*:*:*:wordpress:*:*