Home

Description

The ProSolution WP Client plugin for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 2.0.0. This is due to an array validation mismatch where only the first file in the upload array undergoes extension and MIME type validation, while all files are processed and uploaded to a web-accessible directory. This makes it possible for unauthenticated attackers to upload malicious PHP files and achieve remote code execution by sending a valid first file followed by a malicious file.

PUBLISHED Reserved 2026-04-17 | Published 2026-05-20 | Updated 2026-05-20 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-19:Disclosed

Credits

Achmad Zaenuri Dahlan Putra finder

References

www.wordfence.com/...-7e10-4fb5-8c3b-2bf299d1f3d5?source=cve

plugins.trac.wordpress.org/...lass-prosolwpclient-public.php

plugins.trac.wordpress.org/...lass-prosolwpclient-public.php

plugins.trac.wordpress.org/...unk/includes/UploadHandler.php

plugins.trac.wordpress.org/...0.0/includes/UploadHandler.php

plugins.trac.wordpress.org/...unk/includes/UploadHandler.php

plugins.trac.wordpress.org/...0.0/includes/UploadHandler.php

plugins.trac.wordpress.org/...lass-prosolwpclient-public.php

plugins.trac.wordpress.org/...lass-prosolwpclient-public.php

cve.org (CVE-2026-6555)

nvd.nist.gov (CVE-2026-6555)

Download JSON