The ImageMagick Engine ImageMagick Engine WordPress plugin before 1.7.11 for WordPress is vulnerable to OS Command Injection via the "cli_path" parameter. This allows authenticated attackers, with administrator-level permission to execute arbitrary OS commands on the server leading to remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 11 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Orangelab
Orangelab imagemagick Engine
Weaknesses CWE-78
CPEs cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:*
Vendors & Products Orangelab
Orangelab imagemagick Engine

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The ImageMagick Engine ImageMagick Engine WordPress plugin before 1.7.11 for WordPress is vulnerable to OS Command Injection via the "cli_path" parameter. This allows authenticated attackers, with administrator-level permission to execute arbitrary OS commands on the server leading to remote code execution.
Title ImageMagick Engine < 1.7.11 - Administrator+ OS Command Injection
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-05-20T19:24:28.330Z

Reserved: 2024-07-03T17:36:46.785Z

Link: CVE-2024-6486

cve-icon Vulnrichment

Updated: 2025-05-19T20:27:15.397Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:15:55.220

Modified: 2025-06-11T15:40:01.067

Link: CVE-2024-6486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.