Description
WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1452-1 | wordpress security update |
Debian DSA |
DSA-4250-1 | wordpress security update |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:45:02.465Z
Reserved: 2018-06-26T00:00:00.000Z
Link: CVE-2018-12895
No data.
Status : Modified
Published: 2018-06-26T20:29:00.273
Modified: 2024-11-21T03:46:03.427
Link: CVE-2018-12895
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA