CVE-2021-4225
WordPress vulnerability analysis and mitigation

Overview

CVE-2021-4225 is a file upload vulnerability affecting SP Project & Document Manager WordPress plugin versions 4.23 and below. The vulnerability was discovered by pang0lin and publicly disclosed on June 28, 2021. This security issue affects WordPress installations running the SP Project & Document Manager plugin on Windows environments (WPScan).

Technical details

The vulnerability is a bypass of a previous security fix that attempted to prevent PHP file uploads. While the plugin implements restrictions on file extensions to prevent the upload of PHP files, the security check can be bypassed on Windows servers by appending a dot at the end of the filename (e.g., '1.php.'). Due to Windows file system behavior, the trailing dot is automatically removed, resulting in a valid PHP file on the server (GitHub).

Impact

The vulnerability allows authenticated users, including those with low-privilege roles such as subscribers, to upload and execute arbitrary PHP files on affected WordPress installations. This could lead to remote code execution and potentially full server compromise (WPScan).

Mitigation and workarounds

The vulnerability has been patched in version 4.24 of the SP Project & Document Manager plugin. Site administrators should update to this version or later to protect against this vulnerability (WPScan).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management