This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Path Traversal in WordPress **simple-file-list** plugin. <br>π₯ **Consequences**: Attackers can **delete or write arbitrary files** outside the upload directory. Critical integrity risk!
π **Threshold**: **Low**. <br>π **Auth**: Likely requires **authenticated access** to upload files, but no complex config needed. Easy to exploit if you have user access.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π» **Exploit**: **Yes**. <br>π **PoC**: Available via **Nuclei templates** (projectdiscovery). <br>π **Status**: Publicly documented. Wild exploitation is possible.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Check plugin version in WP Admin. <br>2. Scan with **Nuclei** using CVE-2020-12832 template. <br>3. Look for **file upload** endpoints in the plugin.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **Yes**. <br>π§ **Patch**: Update to **version 4.2.8 or later**. <br>π **Ref**: WordPress Trac changeset 2302759 confirms the fix.
β‘ **Urgency**: **HIGH**. <br>π₯ **Priority**: Patch immediately. <br>π **Risk**: Arbitrary file write/delete is a **critical** threat to server stability and data integrity.