Attacker Value
High
(1 user assessed)
Exploitability
Low
(1 user assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

Wordpress Post Meta Entry RCE

Disclosure Date: February 20, 2019 Last updated February 13, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Metasploit Module

Description

Exploiting a local file inclusion vulnerability and directory traversal vulnerability in Wordpress versions 5.0.0 and prior to v4.9.9 can result in RCE.

Add Assessment

1
Ratings
  • Attacker Value
    High
  • Exploitability
    Low
Technical Analysis

Details

This exploit requires authentication and either the php-imagick or php-gd extension to be installed. Exploiting this vulnerability with only
the php-gd extension installed will require more work when crafting the JPEG because the php-gd extension compresses the image and strips it of
its exif metadata. This is still a valuable exploit due to the large user base of the application.

Technical Analysis