Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2020-36847
CriticalVulnerability Description
The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
35 configuration(s) from 1 vendor(s)
cpe:2.3:a:simplefilelist:simple_file_list:3.2.7:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.4:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.6:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.16:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.14:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:4.1.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.13:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.10:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:1.0.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.0.5:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.15:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.17:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:4.2.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.0.6:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:1.0.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.0.4:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.8:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:4.1.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.1.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:2.0.8:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:4.2.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.12:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:4.1.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.5:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:2.0.7:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:1.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:4.1.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.1.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.11:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:1.0.4:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:3.2.9:*:*:*:*:wordpress:*:*
cpe:2.3:a:simplefilelist:simple_file_list:1.0.2:*:*:*:*:wordpress:*:*
References & Resources
-
https://packetstormsecurity.com/files/160221/security@wordfence.com Exploit
-
https://plugins.trac.wordpress.org/changeset/2286920/simple-file-listsecurity@wordfence.com Patch
-
https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/security@wordfence.com Exploit Third Party Advisory
-
https://www.cybersecurity-help.cz/vdb/SB2020042711security@wordfence.com Third Party Advisory
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cvesecurity@wordfence.com Third Party Advisory
-
https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit Third Party Advisory
Severity Details
Key Information
- Published Date
- July 12, 2025
