CVE-2021-25094

HIGH EXPLOITED IN THE WILD NUCLEI

Tatsu Wordpress Plugin RCE

Title source: metasploit

Description

The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.

Exploits (6)

exploitdb WORKING POC
by Milad karimi · pythonwebappsphp
https://www.exploit-db.com/exploits/52260
nomisec WORKING POC 9 stars
by darkpills · remote
https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce
nomisec WORKING POC 1 stars
by experimentalcrow1 · remote
https://github.com/experimentalcrow1/TypeHub-Exploiter
nomisec WORKING POC 1 stars
by TUANB4DUT · poc
https://github.com/TUANB4DUT/typehub-exploiter
nomisec WORKING POC
by xdx57 · poc
https://github.com/xdx57/CVE-2021-25094
metasploit WORKING POC EXCELLENT
by Vincent Michel, msutovsky-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_tatsu_rce.rb

Nuclei Templates (1)

Wordpress Tatsubuilder <= 3.3.11 - Remote Code Execution
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch

Scores

CVSS v3 8.1
EPSS 0.9136
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2022-11-18
InTheWild.io 2022-05-10
CWE
CWE-306
Status published
Products (1)
brandexponents/tatsu < 3.3.12
Published Apr 25, 2022
Tracked Since Feb 18, 2026