Description
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
Published: 2019-02-20
Score: 8.8 High
EPSS: 93.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1742-1 wordpress security update
Debian DSA Debian DSA DSA-4401-1 wordpress security update
History

No history.

Subscriptions

Debian Debian Linux
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T21:31:37.541Z

Reserved: 2019-02-19T00:00:00.000Z

Link: CVE-2019-8942

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-20T03:29:00.250

Modified: 2024-11-21T04:50:42.360

Link: CVE-2019-8942

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses