Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Pluck 4.7.7-dev2 - PHP Code Execution

0
Medium
Published: Mon Dec 08 2025 (12/08/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Pluck 4.7.7-dev2 - PHP Code Execution

AI-Powered Analysis

AILast updated: 01/03/2026, 00:18:03 UTC

Technical Analysis

The Pluck CMS 4.7.7-dev2 version suffers from a critical PHP code execution vulnerability identified as CVE-2018-11736. This vulnerability stems from insufficient validation of file uploads in the 'Manage Images' section of the admin panel. An attacker with authenticated access can upload a .htaccess file with a content-type of 'image/jpeg' containing Apache directives like 'AddType application/x-httpd-php .jpg'. This configuration causes the Apache web server to interpret .jpg files as PHP scripts, enabling execution of arbitrary PHP code embedded within these files. The exploit leverages the Apache AllowOverride feature, commonly enabled in shared hosting environments, which permits .htaccess files to override server configurations. The attacker uploads a crafted .htaccess file and a malicious .jpg file containing PHP code. When the .jpg file is accessed via a browser, the embedded PHP code executes, granting the attacker full control over the server environment. The vulnerability requires authentication, but credential compromise can occur through phishing, weak passwords, or credential theft. The exploit has been tested on both Ubuntu and Windows platforms, demonstrating cross-platform applicability. No official patches or updates are currently available, so organizations must implement mitigations proactively. Potential consequences include server compromise, data exfiltration, website defacement, and lateral movement within internal networks. The root cause is a combination of insufficient file upload validation and permissive server configurations allowing .htaccess overrides in image directories.

Potential Impact

For European organizations, this vulnerability poses a significant threat to web servers running Pluck CMS, especially those hosting sensitive or critical content. Exploitation can lead to unauthorized access, data breaches, website defacement, and lateral movement within corporate networks. Sectors such as education, media, small and medium enterprises, and government agencies using Pluck CMS may experience service disruption and reputational damage. The ability to execute arbitrary PHP code enables attackers to install backdoors, exfiltrate sensitive data, or launch further attacks against internal systems. Since exploitation requires admin credentials, the risk is heightened if credential hygiene is poor or if phishing/social engineering attacks succeed. The vulnerability could also be used to bypass security controls and evade detection. Although rated medium severity, the actual impact could be critical in targeted attacks. European data protection regulations like GDPR impose strict data security requirements, so breaches caused by this vulnerability could result in regulatory penalties and legal consequences. The threat is particularly acute in countries with higher Pluck CMS usage and where attackers focus on web infrastructure as an attack vector.

Mitigation Recommendations

1. Restrict access to the Pluck CMS admin panel using IP whitelisting, VPNs, or multi-factor authentication to reduce the risk of credential compromise. 2. Disable Apache's AllowOverride directive or configure the web server to ignore .htaccess files in image upload directories to prevent malicious overrides. 3. Implement strict file upload validation to block uploads of .htaccess files or files with executable content types disguised as images. 4. Regularly audit and monitor uploaded files for suspicious content or unauthorized changes, especially in web-accessible directories. 5. Apply the latest security patches or upgrade to a Pluck CMS version that addresses this vulnerability if available. 6. Conduct regular credential audits and enforce strong password policies for admin accounts. 7. Deploy web application firewalls (WAFs) with rules to detect and block attempts to upload or access malicious files. 8. Monitor web server logs for unusual requests to .jpg files or .htaccess uploads. 9. Educate administrators about phishing and social engineering risks to protect admin credentials. 10. Consider isolating the CMS environment to limit potential damage from a compromised server.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Edb Id
52460
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Pluck 4.7.7-dev2 - PHP Code Execution

# Exploit Title: Pluck 4.7.7-dev2 -  PHP Code Execution 
# Date: 2024-10-26
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/pluck-cms/pluck
# Software Link: https://github.com/pluck-cms/pluck
# Version: 4.74-dev5
# Tested on: Ubuntu Windows
# CVE : CVE-2018-11736

PoC:
1)
1. Log in to the Pluck admin panel.\n
2. Navigate to the 'Manage Images' section at http://pluck1/admin.php?action=images.\n
3. Upload a file named '.htaccess' with the content-type 'image/jpeg' containing 'A
... (265 more characters)
Code Length: 765 characters

Threat ID: 693708ee52c2eb5957f7d791

Added to database: 12/8/2025, 5:20:46 PM

Last enriched: 1/3/2026, 12:18:03 AM

Last updated: 2/7/2026, 6:08:57 AM

Views: 240

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats