In Pluck CMS 4.7.20-dev, an authenticated attacker can upload or create a crafted PHP file under the albums module directory and access it via the module routing logic in albums.site.php, resulting in arbitrary command execution through a GET parameter.
No PoCs from references.
- https://github.com/0xC4J/CVE-Lists
- https://github.com/nomi-sec/PoC-in-GitHub