Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-8942


WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.


Published

2019-02-20T03:29:00.250

Last Modified

2024-11-21T04:50:42.360

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-434

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application wordpress wordpress < 4.9.9 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Application wordpress wordpress 5.0 Yes
Operating System debian debian_linux 9.0 Yes

References