{"containers":{"cna":{"affected":[{"product":"SP Project & Document Manager","vendor":"Unknown","versions":[{"lessThan":"4.24","status":"affected","version":"4.24","versionType":"custom"}]}],"credits":[{"lang":"en","value":"pang0lin @webray.com.cn inc"}],"descriptions":[{"lang":"en","value":"The SP Project & Document Manager WordPress plugin before 4.24 allows any authenticated users, such as subscribers, to upload files. The plugin attempts to prevent PHP and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that on Windows servers, the security checks in place were insufficient, enabling bad actors to potentially upload backdoors on vulnerable sites."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-25T15:50:53.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd"},{"tags":["x_refsource_MISC"],"url":"https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md"}],"source":{"discovery":"EXTERNAL"},"title":"SP Project & Document Manager < 4.24 - Subscriber+ Shell Upload","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-4225","STATE":"PUBLIC","TITLE":"SP Project & Document Manager < 4.24 - Subscriber+ Shell Upload"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SP Project & Document Manager","version":{"version_data":[{"version_affected":"<","version_name":"4.24","version_value":"4.24"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"pang0lin @webray.com.cn inc"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The SP Project & Document Manager WordPress plugin before 4.24 allows any authenticated users, such as subscribers, to upload files. The plugin attempts to prevent PHP and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that on Windows servers, the security checks in place were insufficient, enabling bad actors to potentially upload backdoors on vulnerable sites."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434 Unrestricted Upload of File with Dangerous Type"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd","refsource":"MISC","url":"https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd"},{"name":"https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md","refsource":"MISC","url":"https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:16:04.292Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-4225","datePublished":"2022-04-25T15:50:53.000Z","dateReserved":"2022-03-31T00:00:00.000Z","dateUpdated":"2024-08-03T17:16:04.292Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}