Check Point Reference: | CPAI-2020-0869 |
Date Published: | 29 Sep 2020 |
Severity: | Critical |
Last Updated: | Wednesday 27 December, 2023 |
Source: | |
Industry Reference: | CVE-2020-25213 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | WordPress File Manager Plugin prior to 6.9 |
Vulnerability Description | A remote code execution vulnerability exists in WordPress File Manager Plugin. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. |
IPSDU-24457
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: WordPress Enforcement Protection.
Attack Information: WordPress File Manager Plugin Remote Code Execution (CVE-2020-25213)