WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

Subscriptions

Vendors Products
Debian Linux Subscribe
Wordpress Subscribe
Wordpress Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1452-1 wordpress security update
Debian DSA Debian DSA DSA-4250-1 wordpress security update
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:45:02.465Z

Reserved: 2018-06-26T00:00:00.000Z

Link: CVE-2018-12895

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-26T20:29:00.273

Modified: 2024-11-21T03:46:03.427

Link: CVE-2018-12895

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses