Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34628 | The WordPress Mega Menu plugin for WordPress is vulnerable to Arbitrary File Creation in versions up to, and including, 2.0.6 via the compiler_save AJAX action. This makes it possible for unauthenticated attackers to create arbitrary PHP files that can be used to execute malicious code. |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quadlayers
Quadlayers wordpress Mega Menu-quadmenu |
|
| CPEs | cpe:2.3:a:quadlayers:wordpress_mega_menu-quadmenu:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Quadlayers
Quadlayers wordpress Mega Menu-quadmenu |
|
| Metrics |
ssvc
|
Wed, 16 Oct 2024 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WordPress Mega Menu plugin for WordPress is vulnerable to Arbitrary File Creation in versions up to, and including, 2.0.6 via the compiler_save AJAX action. This makes it possible for unauthenticated attackers to create arbitrary PHP files that can be used to execute malicious code. | |
| Title | WordPress Mega Menu <= 2.0.6 - Arbitrary File Creation | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:33:03.764Z
Reserved: 2024-10-15T18:21:15.617Z
Link: CVE-2021-4443
Updated: 2024-10-16T18:22:16.592Z
Status : Deferred
Published: 2024-10-16T07:15:09.713
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-4443
No data.
OpenCVE Enrichment
No data.
EUVD