Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-8942
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Feb, 2019 | 03:29
Updated At-21 Jul, 2021 | 11:39

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.8HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

WordPress.org
wordpress
>>wordpress>>Versions before 4.9.9(exclusive)
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*
WordPress.org
wordpress
>>wordpress>>5.0
cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>9.0
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-434Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rcecve@mitre.org
Exploit
Third Party Advisory
http://www.securityfocus.com/bid/107088cve@mitre.org
Third Party Advisory
VDB Entry
https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/cve@mitre.org
Exploit
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00044.htmlcve@mitre.org
Exploit
Third Party Advisory
https://wpvulndb.com/vulnerabilities/9222cve@mitre.org
Third Party Advisory
https://www.debian.org/security/2019/dsa-4401cve@mitre.org
Third Party Advisory
https://www.exploit-db.com/exploits/46511/cve@mitre.org
Exploit
VDB Entry
Third Party Advisory
https://www.exploit-db.com/exploits/46662/cve@mitre.org
Exploit
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found