CVE-2019-8942

HIGH EXPLOITED IN THE WILD

Wordpress < 4.9.9 - Unrestricted File Upload

Title source: rule

Description

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

Exploits (8)

nomisec WORKING POC 73 stars
by brianwrf · poc
https://github.com/brianwrf/WordPress_4.9.8_RCE_POC
nomisec WORKING POC 4 stars
by synacktiv · remote-auth
https://github.com/synacktiv/CVE-2019-8942
nomisec WRITEUP 1 stars
by tuannq2299 · poc
https://github.com/tuannq2299/CVE-2019-8942
nomisec WORKING POC
by synod2 · poc
https://github.com/synod2/WP_CROP_RCE
exploitdb WORKING POC
by allyshka · javascriptwebappsphp
https://www.exploit-db.com/exploits/46511
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/46662
vulncheck_xdb WORKING POC
remote-auth
https://github.com/oussama-rahali/CVE-2019-8943
metasploit WORKING POC EXCELLENT
by RIPSTECH Technology, Wilfried Becard <[email protected]> · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_crop_rce.rb

Scores

CVSS v3 8.8
EPSS 0.9296
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2021-04-12
InTheWild.io 2021-04-12

Classification

CWE
CWE-434
Status published

Affected Products (11)

wordpress/wordpress < 4.9.9
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
debian/debian_linux

Timeline

Published Feb 20, 2019
Tracked Since Feb 18, 2026