In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wpgetattachmentthumbfile function in wp-includes/post.php.
{
"binaries": [
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-l10n"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-theme-twentyfifteen"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-theme-twentyfourteen"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-theme-twentysixteen"
}
]
}
{
"binaries": [
{
"binary_version": "4.9.5+dfsg1-1",
"binary_name": "wordpress"
},
{
"binary_version": "4.9.5+dfsg1-1",
"binary_name": "wordpress-l10n"
},
{
"binary_version": "4.9.5+dfsg1-1",
"binary_name": "wordpress-theme-twentyfifteen"
},
{
"binary_version": "4.9.5+dfsg1-1",
"binary_name": "wordpress-theme-twentyseventeen"
},
{
"binary_version": "4.9.5+dfsg1-1",
"binary_name": "wordpress-theme-twentysixteen"
}
]
}