{"id":59775,"date":"2025-07-31T11:16:20","date_gmt":"2025-07-31T11:16:20","guid":{"rendered":""},"modified":"2025-08-31T18:55:45","modified_gmt":"2025-09-01T00:55:45","slug":"cve-2015-10144-arbitrary-file-upload-vulnerability-in-responsive-thumbnail-slider-plugin-for-wordpress","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2015-10144-arbitrary-file-upload-vulnerability-in-responsive-thumbnail-slider-plugin-for-wordpress\/","title":{"rendered":"<strong>CVE-2015-10144: Arbitrary File Upload Vulnerability in Responsive Thumbnail Slider Plugin for WordPress<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2015-10144 vulnerability pertains to the popular WordPress plugin, Responsive Thumbnail Slider. This plugin, widely used for enhancing website aesthetics, has a significant flaw. It allows for <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41668-critical-file-replacement-leading-to-unauthorized-access\/\"  data-wpil-monitor-id=\"66298\">unauthorized file<\/a> uploads due to an absence of file type sanitization, specifically in versions up to 1.0.1.<br \/>\nThe implications of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49267-serious-sql-injection-vulnerability-in-shabti-kaplan-frontend-admin-by-dynamiapps\/\"  data-wpil-monitor-id=\"77165\">vulnerability are serious<\/a> and far-reaching. Any authenticated attacker with subscriber-level <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36600-dell-bios-improper-access-control-vulnerability-allows-potential-system-compromise\/\"  data-wpil-monitor-id=\"70691\">access or above can potentially<\/a> exploit this flaw. This can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30404-integer-overflow-vulnerability-in-executorch-resulting-in-potential-system-compromise\/\"  data-wpil-monitor-id=\"75960\">result in system<\/a> compromise or data leakage, leading to serious repercussions for the affected organization.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2015-10144<br \/>\nSeverity: High &#8211; CVSS 8.8<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low (Subscriber-level access or above)<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31278-memory-corruption-vulnerability-with-potential-system-compromise\/\"  data-wpil-monitor-id=\"70690\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1961811573\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Responsive Thumbnail Slider <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7696-critical-php-object-injection-vulnerability-in-wordpress-plugin-integration\/\"  data-wpil-monitor-id=\"70867\">Plugin for WordPress<\/a> | Up to 1.0.1<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>An authenticated attacker can exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52809-php-remote-file-inclusion-vulnerability-in-national-weather-service-alerts\/\"  data-wpil-monitor-id=\"65942\">vulnerability by uploading a malicious file<\/a> with a double extension via the image uploader feature. The plugin does not perform proper file type sanitization, allowing the attacker to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-26074-remote-code-execution-vulnerability-in-orkes-conductor-v3-21-11\/\"  data-wpil-monitor-id=\"66299\">execute arbitrary code<\/a> on the server. The executed <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54444-unrestricted-file-upload-leading-to-code-injection-in-samsung-electronics-magicinfo-9-server\/\"  data-wpil-monitor-id=\"67234\">code can then lead<\/a> to unauthorized access to sensitive data or even full control over the affected system.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2530113249\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of a malicious HTTP <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36845-server-side-request-forgery-ssrf-vulnerability-in-eveo-urve-web-manager\/\"  data-wpil-monitor-id=\"70689\">request that an attacker might use to exploit this vulnerability<\/a>:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/wp-content\/plugins\/responsive-thumbnail-slider\/upload.php HTTP\/1.1\nHost: target.example.com\nContent-Type: multipart\/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW\n------WebKitFormBoundary7MA4YWxkTrZu0gW\nContent-Disposition: form-data; name=&quot;imagefile&quot;; filename=&quot;malicious.php.jpg&quot;\nContent-Type: image\/jpeg\n{ &quot;malicious_payload&quot;: &quot;...&quot; }\n------WebKitFormBoundary7MA4YWxkTrZu0gW--<\/code><\/pre>\n<p>In this example, an attacker <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7340-critical-arbitrary-file-upload-vulnerability-in-ht-contact-form-widget-for-wordpress\/\"  data-wpil-monitor-id=\"66339\">uploads a file<\/a> with a double extension, bypassing the plugin&#8217;s file type checks and executing the malicious payload on the server.<br \/>\nAll WordPress websites using the affected versions of the Responsive <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5835-droip-plugin-for-wordpress-unauthorized-access-and-modification-vulnerability\/\"  data-wpil-monitor-id=\"68958\">Thumbnail Slider plugin<\/a> should immediately apply the vendor patch to rectify this issue. Alternatively, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2015-10144 vulnerability pertains to the popular WordPress plugin, Responsive Thumbnail Slider. This plugin, widely used for enhancing website aesthetics, has a significant flaw. It allows for unauthorized file uploads due to an absence of file type sanitization, specifically in versions up to 1.0.1. The implications of this vulnerability are serious and far-reaching. Any [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59775","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59775"}],"version-history":[{"count":9,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59775\/revisions"}],"predecessor-version":[{"id":69537,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59775\/revisions\/69537"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59775"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59775"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59775"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59775"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59775"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59775"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}