CVE-2008-3362

N/A Unknown
Published: July 30, 2008 Modified: April 23, 2026
View on NVD

Description

Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/30365
Source: cve@mitre.org
Exploit
http://securityreason.com/securityalert/4060
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/30365
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/43987
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/6127
Source: af854a3a-2127-422b-91ae-364da2661108

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

giulio_ganci wordpress