CVE-2019-8942
Published Feb 20, 2019
Last updated 3 years ago
Overview
- Description
- WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-434
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEEA870E-2BB4-4720-A3D9-1FFBA5596D94", "versionEndExcluding": "4.9.9" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6388DAB8-F3FA-4200-9F3B-95C313A60D6C" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94A6DBFD-C0C6-4DE4-87C2-172B775D2D79" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28795DB4-793A-45FE-9AC3-8DA0744EC49A" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C648F2-8168-499C-ABEA-80257CA6602F" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8491A84A-412E-48EA-BB3E-6B8DE391C0B7" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "226A4045-672A-4D89-9A81-695EA1AD2567" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D05F1BB-F066-4D9D-A270-106DABE83E58" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDBA025-8E1C-4712-AA3A-9061F59517CC" }, { "criteria": "cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFFF7BFC-9D10-4569-965A-9640C722EEBC" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ], "operator": "OR" } ] } ]