Vulnerability Description
The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomlaserviceprovider | Wsecure | < 2.4 |
Related Weaknesses (CWE)
References
- https://wordpress.org/plugins/wsecure/#developersRelease Notes
- https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulneExploitThird Party Advisory
- https://wordpress.org/plugins/wsecure/#developersRelease Notes
- https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulneExploitThird Party Advisory
FAQ
What is CVE-2016-10960?
CVE-2016-10960 is a vulnerability with a CVSS score of 8.8 (HIGH). The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.
How severe is CVE-2016-10960?
CVE-2016-10960 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10960?
Check the references section above for vendor advisories and patch information. Affected products include: Joomlaserviceprovider Wsecure.