CVE-2015-8351

CRITICAL EXPLOITED

Gwolle Guestbook <1.5.4 - RCE

Title source: llm

Description

PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.

Exploits (4)

exploitdb WRITEUP
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/38861
nomisec WORKING POC 2 stars
by G4sp4rCS · infoleak
https://github.com/G4sp4rCS/exploit-CVE-2015-8351
nomisec WORKING POC 1 stars
by G01d3nW01f · remote
https://github.com/G01d3nW01f/CVE-2015-8351
nomisec WORKING POC
by Philip-Otter · remote
https://github.com/Philip-Otter/CVE-2015-8351_Otter_Remix

Scores

CVSS v3 9.0
EPSS 0.6945
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2024-01-22
CWE
CWE-94
Status published
Products (1)
gwolle_guestbook_project/gwolle_guestbook < 1.5.3
Published Sep 11, 2017
Tracked Since Feb 18, 2026