CVE-2020-36847 – WordPress Simple-File-List Remote Code Execution Vulnerability

The following table lists the changes that have been made to the
CVE-2020-36847 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 12, 2025

    Action Type Old Value New Value
    Added Description The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-434
    Added Reference https://packetstormsecurity.com/files/160221/
    Added Reference https://plugins.trac.wordpress.org/changeset/2286920/simple-file-list
    Added Reference https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/
    Added Reference https://www.cybersecurity-help.cz/vdb/SB2020042711
    Added Reference https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cve
Share the Post:

Related Posts