CVE-2021-25094
HIGH EXPLOITED IN THE WILD NUCLEITatsu Wordpress Plugin RCE
Title source: metasploitDescription
The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.
Exploits (6)
nomisec
WORKING POC
9 stars
by darkpills · remote
https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce
nomisec
WORKING POC
1 stars
by experimentalcrow1 · remote
https://github.com/experimentalcrow1/TypeHub-Exploiter
metasploit
WORKING POC
EXCELLENT
by Vincent Michel, msutovsky-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_tatsu_rce.rb
Nuclei Templates (1)
Wordpress Tatsubuilder <= 3.3.11 - Remote Code Execution
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
References (5)
Scores
CVSS v3
8.1
EPSS
0.9136
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2022-11-18
InTheWild.io
2022-05-10
CWE
CWE-306
Status
published
Products (1)
brandexponents/tatsu
< 3.3.12
Published
Apr 25, 2022
Tracked Since
Feb 18, 2026