CVE-2020-36847

CRITICAL

Simple-File-List Plugin <4.2.2 - RCE

Title source: llm

Description

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

Exploits (3)

exploitdb WORKING POC
by Md Amanat Ullah (xSwads) · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52371
nomisec WORKING POC 1 stars
by ftz7 · poc
https://github.com/ftz7/PoC-CVE-2020-36847-WordPress-Plugin-4.2.2-RCE
metasploit WORKING POC GOOD
by coiffeur, h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_simple_file_list_rce.rb

Scores

CVSS v3 9.8
EPSS 0.8722
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (2)
eemitch/Simple File List < 4.2.3
simplefilelist/simple_file_list < 4.2.3
Published Jul 12, 2025
Tracked Since Feb 18, 2026