Full title: WordPress Simple File List Unauthenticated Remote Code Execution Exploit Category: remote exploits Platform: php This Metasploit module exploits WordPress Simple File List plugin versions prior to 4.2.3, which allows remote unauthenticated attackers to upload files within a controlled list of extensions. However, the rename function does not conform to the file extension restrictions, thus allowing arbitrary PHP code to be uploaded first as a png then renamed to php and executed. # 0day.today @ http://0day.today/