The following table lists the changes that have been made to the
CVE-2020-36847 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jul. 12, 2025
Action Type Old Value New Value Added Description The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-434 Added Reference https://packetstormsecurity.com/files/160221/ Added Reference https://plugins.trac.wordpress.org/changeset/2286920/simple-file-list Added Reference https://wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/ Added Reference https://www.cybersecurity-help.cz/vdb/SB2020042711 Added Reference https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=cve