First published: Wed Feb 20 2019(Updated: )
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | <4.9.9 | |
WordPress | =5.0 | |
WordPress | =5.0-beta1 | |
WordPress | =5.0-beta2 | |
WordPress | =5.0-beta3 | |
WordPress | =5.0-beta4 | |
WordPress | =5.0-beta5 | |
WordPress | =5.0-rc1 | |
WordPress | =5.0-rc2 | |
WordPress | =5.0-rc3 | |
Debian Debian Linux | =9.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.