CVE-2019-8943

MEDIUM NUCLEI

Wordpress < 5.0.3 - Path Traversal

Title source: rule

Description

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/46662
exploitdb WORKING POC
by allyshka · javascriptwebappsphp
https://www.exploit-db.com/exploits/46511
nomisec WORKING POC 24 stars
by oussama-rahali · poc
https://github.com/oussama-rahali/CVE-2019-8943
nomisec WORKING POC 3 stars
by hadrian3689 · poc
https://github.com/hadrian3689/wordpress_cropimage
metasploit WORKING POC EXCELLENT
by RIPSTECH Technology, Wilfried Becard <[email protected]> · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_crop_rce.rb
inthewild WORKING POC
poc
https://github.com/v0lck3r/cve-2019-8943

Nuclei Templates (1)

WordPress Core 5.0.0 - Crop-image Shell Upload
MEDIUMVERIFIEDby sttlr
Shodan: http.component:"wordpress" || cpe:"cpe:2.3:a:wordpress:wordpress"
FOFA: body="oembed" && body="wp-"

Scores

CVSS v3 6.5
EPSS 0.9389
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Details

CWE
CWE-22
Status published
Products (1)
wordpress/wordpress < 5.0.3
Published Feb 20, 2019
Tracked Since Feb 18, 2026