WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an wpattached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "4.9.9"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-NA"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-8942.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-beta1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-beta2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-beta3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-beta4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-beta5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]