#VU47899 Arbitrary file upload in Super Logos Showcase for WordPress
Published: October 26, 2020
Super Logos Showcase for WordPress
highwarden
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can set the Content-Type header to "Content-Type: text/csv", as well as use a double extension to bypass the checks in place, upload a malicious file and execute it on the server.