The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajaxUpload function in versions before 1.3.9.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
References
| Link | Resource |
|---|---|
| https://g0blin.co.uk/g0blin-00036/ | Exploit Third Party Advisory |
| https://github.com/espreto/wpsploit/blob/master/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb | Product |
| https://plugins.trac.wordpress.org/changeset/1103406 | Patch |
| https://wordpress.org/plugins/wpshop/#developers | Product |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/32e8224d-a653-48d7-a3f4-338fc0c1dc77?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-19 10:15
Updated : 2025-12-16 16:49
NVD link : CVE-2015-10135
Mitre link : CVE-2015-10135
CVE.ORG link : CVE-2015-10135
JSON object : View
Products Affected
eoxia
- wpshop_2
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
