Home

Description

HS Brand Logo Slider 2.1 contains an unrestricted file upload vulnerability that allows authenticated users to bypass client-side file extension validation by uploading arbitrary files. Attackers can intercept upload requests to the logoupload parameter in the admin interface and rename files to executable extensions .php to achieve remote code execution.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unrestricted Upload of File with Dangerous Type

Product status

2.1
affected

Credits

Net-Hunter finder

References

www.exploit-db.com/exploits/48913 (ExploitDB-48913) exploit

www.heliossolutions.co/ (Official Product Homepage) product

ms.wordpress.org/plugins/hs-brand-logo-slider/ (Product Reference) product

www.vulncheck.com/...nd-logo-slider-unrestricted-file-upload (VulnCheck Advisory: WordPress Plugin HS Brand Logo Slider 2.1 Unrestricted File Upload) third-party-advisory

cve.org (CVE-2020-37227)

nvd.nist.gov (CVE-2020-37227)

Download JSON