#VU47898 Arbitrary file upload in Super Interactive Maps for WordPress
Published: October 26, 2020
Super Interactive Maps for WordPress
highwarden
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can set the Content-Type header to "Content-Type: text/csv", as well as use a double extension to bypass the checks in place, upload a malicious file and execute it on the server.