Security News > 2020 > July > Critical Security Flaw in WordPress Plugin Allows RCE

Researchers are warning of a critical vulnerability in a WordPress plugin called Comments - wpDiscuz, which is installed on more than 70,000 websites.
The flaw gives unauthenticated attackers the ability to upload arbitrary files and ultimately execute remote code on vulnerable website servers.
The implementation of this feature lacked security protections vetting file attachments in the comments to make sure they actually are image files, versus another type of file.
To pass the file content-verification check, an attacker would simply need to add an image to make any file look like the allowed file type.
Earlier in July, it was discovered that the Adning Advertising plugin for WordPress, a premium plugin with over 8,000 customers, contains a critical remote code-execution vulnerability with the potential to be exploited by unauthenticated attackers.
News URL
https://threatpost.com/critical-rce-flaw-wordpress-plugin-on-70k-sites/157824/
Related news
- Still Using an Older Version of iOS or iPadOS? Update Now to Patch These Critical Security Vulnerabilities (source)
- Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability (source)
- Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (source)
- Critical Erlang/OTP SSH RCE bug now has public exploits, patch now (source)
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) (source)
- WordPress plugin disguised as a security tool injects backdoor (source)
- Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers (source)
- Critical Langflow RCE flaw exploited to hack AI app servers (source)
- SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version (source)
- Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals (source)