Vulnerability Description
The Social Photo Gallery plugin 1.0 for WordPress allows Remote Code Execution by creating an album and attaching a malicious PHP file in the cover photo album, because the file extension is not checked.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Infoway | Social Photo Gallery | 1.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-RExploitThird Party AdvisoryVDB Entry
- https://seclists.org/fulldisclosure/2019/Nov/13ExploitMailing ListThird Party Advisory
- https://wordpress.org/plugins/social-photo-gallery/#developersRelease NotesThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9952Third Party Advisory
- http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-RExploitThird Party AdvisoryVDB Entry
- https://seclists.org/fulldisclosure/2019/Nov/13ExploitMailing ListThird Party Advisory
- https://wordpress.org/plugins/social-photo-gallery/#developersRelease NotesThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9952Third Party Advisory
FAQ
What is CVE-2019-14467?
CVE-2019-14467 is a vulnerability with a CVSS score of 7.8 (HIGH). The Social Photo Gallery plugin 1.0 for WordPress allows Remote Code Execution by creating an album and attaching a malicious PHP file in the cover photo album, because the file extension is not check...
How severe is CVE-2019-14467?
CVE-2019-14467 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14467?
Check the references section above for vendor advisories and patch information. Affected products include: Infoway Social Photo Gallery.