WordPress 3.7-5.0 (except 4.9.9) - Authenticated Code Execution



Description
An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. 

Affects WordPresses

fixed in version 5.0.1
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1

References

CVE 2019-8942
URL https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/

Classification

Type RCE
OWASP Top 10 A1: Injection
CWE CWE-94

Miscellaneous

Original Researcher Simon Scannell (RIPS Technologies)
Submitter Ryan Dewhurst
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 16610
Verified No
WPVDB ID 9222

Timeline

Publicly Published 2019-02-19 (3 months ago)
Added 2019-02-28 (3 months ago)
Last Updated 2019-02-28 (3 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.