Arbitrary Code Execution Affecting johnpbloch/wordpress-core package, versions <4.9.9 >=5.0.0, <5.0.1
Threat Intelligence
Exploit Maturity
Mature
EPSS
94.33% (100th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-JOHNPBLOCHWORDPRESSCORE-173727
- published 20 Feb 2019
- disclosed 20 Feb 2019
- credit Unknown
Introduced: 20 Feb 2019
CVE-2019-8942 Open this link in a new tabHow to fix?
Upgrade johnpbloch/wordpress-core
to version 4.9.9, 5.0.1 or higher.
Overview
johnpbloch/wordpress-core is a web software you can use to create a website or blog.
Affected versions of this package are vulnerable to Arbitrary Code Execution via the _wp_attached_file
Post Meta entry. An attacker with author privileges could execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata.
References
CVSS Scores
version 3.1