Total vulnerabilities in the database
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
Software | From | Fixed in |
---|---|---|
WordPress / wordpress | - | 4.9.9 |
WordPress / wordpress | 5.0-rc1 | 5.0-rc1.x |
WordPress / wordpress | 5.0-rc2 | 5.0-rc2.x |
WordPress / wordpress | 5.0-rc3 | 5.0-rc3.x |
WordPress / wordpress | 5.0-beta1 | 5.0-beta1.x |
WordPress / wordpress | 5.0-beta2 | 5.0-beta2.x |
WordPress / wordpress | 5.0-beta3 | 5.0-beta3.x |
WordPress / wordpress | 5.0-beta4 | 5.0-beta4.x |
WordPress / wordpress | 5.0-beta5 | 5.0-beta5.x |
WordPress / wordpress | 5.0 | 5.0.x |
debian / debian_linux | 9.0 | 9.0.x |