Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-8943 — Path Traversal in Wordpress
Severity
8.8HIGHNVD
NVD6.5OSV6.5
EPSS
93.9%
top 0.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 20
Latest updateMar 31
Description
WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages4 packages
Also affects: Debian Linux 9.0
🔴Vulnerability Details
7💥Exploits & PoCs
4📋Vendor Advisories
2🕵️Threat Intelligence
7💬Community
4Bugzilla▶
CVE-2019-8942 wordpress: Author users can execute arbitrary code by leveraging path traversal↗2019-02-20