Description
The Responsive Thumbnail Slider plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type sanitization in the via the image uploader in versions up to 1.0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected sites server using a double extension which may make remote code execution possible.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Arash Khazaei · textwebappsphp
https://www.exploit-db.com/exploits/37998
References (5)
Core 5
Core References
Scores
CVSS v3
8.8
EPSS
0.0077
EPSS Percentile
73.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (2)
i13websolution/thumbnail_carousel_slider
< 1.0.1
nik00726/Thumbnail carousel slider
< 1.0.1
Published
Jul 25, 2025
Tracked Since
Feb 18, 2026