HS Brand Logo Slider 2.1 contains an unrestricted file upload vulnerability that allows authenticated users to bypass client-side file extension validation by uploading arbitrary files. Attackers can intercept upload requests to the logoupload parameter in the admin interface and rename files to executable extensions .php to achieve remote code execution.
Metrics
Affected Vendors & Products
References
History
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HS Brand Logo Slider 2.1 contains an unrestricted file upload vulnerability that allows authenticated users to bypass client-side file extension validation by uploading arbitrary files. Attackers can intercept upload requests to the logoupload parameter in the admin interface and rename files to executable extensions .php to achieve remote code execution. | |
| Title | WordPress Plugin HS Brand Logo Slider 2.1 Unrestricted File Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-16T15:25:45.310Z
Reserved: 2026-05-15T13:25:19.369Z
Link: CVE-2020-37227
No data.
Status : Received
Published: 2026-05-16T16:16:17.713
Modified: 2026-05-16T16:16:17.713
Link: CVE-2020-37227
No data.
OpenCVE Enrichment
Updated: 2026-05-16T16:45:27Z