{ "schema_version": "1.4.0", "id": "GHSA-vqcv-hf93-cvhh", "modified": "2025-04-11T04:17:25Z", "published": "2022-05-17T04:55:59Z", "aliases": [ "CVE-2013-7102" ], "details": "Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7102" }, { "type": "WEB", "url": "http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html" }, { "type": "WEB", "url": "http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2013/Dec/127" }, { "type": "WEB", "url": "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-12-23T23:55:00Z" } }