Vulnerability Description
In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| User Photo Project | User Photo | 0.9.4 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/347137PatchThird Party Advisory
- https://wordpress.org/plugins/user-photo/#developersRelease NotesThird Party Advisory
- https://www.exploit-db.com/exploits/16181ExploitThird Party AdvisoryVDB Entry
- https://plugins.trac.wordpress.org/changeset/347137PatchThird Party Advisory
- https://wordpress.org/plugins/user-photo/#developersRelease NotesThird Party Advisory
- https://www.exploit-db.com/exploits/16181ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2013-1916?
CVE-2013-1916 is a vulnerability with a CVSS score of 8.8 (HIGH). In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (exe...
How severe is CVE-2013-1916?
CVE-2013-1916 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1916?
Check the references section above for vendor advisories and patch information. Affected products include: User Photo Project User Photo.