Unrated severityNVD Advisory· Published Jul 12, 2025· Updated Apr 8, 2026
Simple File List < 4.2.3 - Remote Code Execution
CVE-2020-36847
Description
The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- packetstormsecurity.com/files/160221/mitre
- plugins.trac.wordpress.org/changeset/2286920/simple-file-listmitre
- wpscan.com/vulnerability/365da9c5-a8d0-45f6-863c-1b1926ffd574/mitre
- www.cybersecurity-help.cz/vdb/SB2020042711mitre
- www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07emitre
News mentions
0No linked articles in our index yet.