Beware: WordPress Plugin Vulnerability Turns Files Into Remote Control!
The Simple File List WordPress Plugin 4.2.2 has a vulnerability that allows file uploads leading to remote code execution. This exploit is like sneaking a Trojan horse into a castle, but with way less horse and way more PHP. In short, if you’re running this plugin, it’s time to update faster than a cat on a hot tin roof.

Hot Take:
Once again, the WordPress plugin community proves that even the simplest of file lists can spawn a wild cyber-adventure. Who knew that organizing files could lead to a gallant dance with Remote Code Execution (RCE)? If File Management was a sport, the Simple File List plugin just won the “Most Explosive” category!
Key Points:
- The Simple File List WordPress Plugin (version 4.2.2 and below) is vulnerable to a File Upload to Remote Code Execution exploit.
- This vulnerability, dubbed CVE-2020-36847, allows attackers to upload malicious files that can execute arbitrary code.
- The exploit script is a Python-based tool that requires little finesse to execute.
- The exploit was tested on Ubuntu 22.04, showcasing its platform versatility.
- Web administrators should double-check their plugin versions and apply patches faster than you can say “WordPress Security Breach!”
Already a member? Log in here