WordPress 3.7-5.0 (except 4.9.9) - Authenticated Code Execution



Description
An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. 

Affects WordPresses

fixed in version 5.0.1
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 4.9.9
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1
fixed in version 5.0.1

References

CVE 2019-8942
CVE 2019-8943
URL https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
URL https://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce

Classification

Type RCE
OWASP Top 10 A1: Injection
CWE CWE-94

Miscellaneous

Original Researcher Simon Scannell (RIPS Technologies)
Submitter Ryan Dewhurst
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 25657
Verified No
WPVDB ID 9222

Timeline

Publicly Published 2019-02-19 (9 months ago)
Added 2019-02-28 (9 months ago)
Last Updated 2019-11-08 (6 days ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin