{"containers":{"cna":{"affected":[{"product":"AGIL(Automatic Grid Image Listing)","vendor":"Unknown","versions":[{"lessThanOrEqual":"1.0","status":"affected","version":"1.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Chuang LI"}],"descriptions":[{"lang":"en","value":"The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-16T14:30:27.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a"}],"source":{"discovery":"EXTERNAL"},"title":"AGIL <= 1.0 - Admin+ Arbitrary File Upload","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-25119","STATE":"PUBLIC","TITLE":"AGIL <= 1.0 - Admin+ Arbitrary File Upload"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"AGIL(Automatic Grid Image Listing)","version":{"version_data":[{"version_affected":"<=","version_name":"1.0","version_value":"1.0"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Chuang LI"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The AGIL WordPress plugin through 1.0 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434 Unrestricted Upload of File with Dangerous Type"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a","refsource":"MISC","url":"https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:56:09.988Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/47235989-d9f1-48a5-9799-fdef0889bf8a"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-25119","datePublished":"2022-05-16T14:30:27.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:56:09.988Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}