CVE-2015-8351
CRITICAL EXPLOITEDGwolle Guestbook <1.5.4 - RCE
Title source: llmDescription
PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
Exploits (4)
nomisec
WORKING POC
2 stars
by G4sp4rCS · infoleak
https://github.com/G4sp4rCS/exploit-CVE-2015-8351
nomisec
WORKING POC
by Philip-Otter · remote
https://github.com/Philip-Otter/CVE-2015-8351_Otter_Remix
References (5)
Scores
CVSS v3
9.0
EPSS
0.6945
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-22
CWE
CWE-94
Status
published
Products (1)
gwolle_guestbook_project/gwolle_guestbook
< 1.5.3
Published
Sep 11, 2017
Tracked Since
Feb 18, 2026