Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Pluck 4.7.7-dev2 - PHP Code Execution

0
Medium
Published: Mon Dec 08 2025 (12/08/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Pluck 4.7.7-dev2 - PHP Code Execution

AI-Powered Analysis

AILast updated: 12/08/2025, 17:21:15 UTC

Technical Analysis

The Pluck CMS 4.7.7-dev2 version suffers from a critical PHP code execution vulnerability identified as CVE-2018-11736. This vulnerability arises from the ability of an authenticated administrator to upload files to the 'Manage Images' section without sufficient validation. Specifically, an attacker can upload a .htaccess file masquerading as an image (with content-type 'image/jpeg') that contains directives such as 'AddType application/x-httpd-php .jpg'. This configuration instructs the web server to treat .jpg files as PHP scripts, enabling execution of arbitrary PHP code embedded within these files. The exploit requires the attacker to have valid admin panel credentials, which can be obtained through credential theft or weak password attacks. Once the malicious .htaccess and .jpg files are uploaded, accessing the crafted .jpg file triggers the execution of the embedded PHP code, allowing the attacker to execute arbitrary commands on the server. The vulnerability leverages Apache's AllowOverride feature to enable .htaccess files, which is common in many shared hosting environments. The exploit has been tested on Ubuntu and Windows platforms, indicating cross-platform applicability. Although no widespread exploitation is currently reported, the presence of publicly available proof-of-concept code lowers the barrier for attackers. The root cause is insufficient file upload validation combined with permissive server configurations. The vulnerability can lead to full server compromise, data theft, defacement, or pivoting to internal networks. The lack of official patches or updates in the provided data suggests organizations must implement mitigations proactively. This vulnerability is particularly relevant for websites using Pluck CMS for content management, especially those with exposed admin panels accessible over the internet.

Potential Impact

For European organizations, this vulnerability poses a significant risk to web servers running Pluck CMS, particularly those hosting sensitive or critical content. Exploitation can lead to unauthorized access, data breaches, website defacement, and potential lateral movement within corporate networks. Organizations in sectors such as education, media, small and medium enterprises, and government agencies using Pluck CMS may face service disruption and reputational damage. The ability to execute arbitrary PHP code can allow attackers to install backdoors, exfiltrate data, or launch further attacks against internal systems. Given the exploit requires admin credentials, the impact is amplified if credential hygiene is poor or if phishing/social engineering attacks succeed. Additionally, the vulnerability could be leveraged to bypass security controls and evade detection. The medium severity rating underestimates the potential damage if exploited in targeted attacks. European data protection regulations (e.g., GDPR) impose strict requirements on data security, so breaches resulting from this vulnerability could lead to regulatory penalties and legal consequences. The threat is heightened in countries with higher Pluck CMS usage and where attackers focus on web infrastructure as an attack vector.

Mitigation Recommendations

1. Immediately restrict access to the Pluck CMS admin panel using IP whitelisting, VPNs, or multi-factor authentication to reduce the risk of credential compromise. 2. Disable Apache's AllowOverride directive or configure the web server to ignore .htaccess files in the image upload directories to prevent malicious overrides. 3. Implement strict file upload validation to block uploads of .htaccess files or files with executable content types disguised as images. 4. Regularly audit and monitor uploaded files for suspicious content or unauthorized changes, especially in directories accessible via the web. 5. Apply the latest security patches or upgrade to a Pluck CMS version that addresses this vulnerability if available. 6. Conduct regular credential audits and enforce strong password policies for admin accounts. 7. Employ web application firewalls (WAFs) with rules to detect and block attempts to upload or access malicious files. 8. Monitor web server logs for unusual requests to .jpg files or .htaccess uploads. 9. Educate administrators about phishing and social engineering risks to protect admin credentials. 10. Consider isolating the CMS environment to limit potential damage from a compromised server.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52460
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Pluck 4.7.7-dev2 - PHP Code Execution

# Exploit Title: Pluck 4.7.7-dev2 -  PHP Code Execution 
# Date: 2024-10-26
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/pluck-cms/pluck
# Software Link: https://github.com/pluck-cms/pluck
# Version: 4.74-dev5
# Tested on: Ubuntu Windows
# CVE : CVE-2018-11736

PoC:
1)
1. Log in to the Pluck admin panel.\n
2. Navigate to the 'Manage Images' section at http://pluck1/admin.php?action=images.\n
3. Upload a file named '.htaccess' with the content-type 'image/jpeg' containing 'A
... (265 more characters)
Code Length: 765 characters

Threat ID: 693708ee52c2eb5957f7d791

Added to database: 12/8/2025, 5:20:46 PM

Last enriched: 12/8/2025, 5:21:15 PM

Last updated: 12/10/2025, 6:48:13 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats