In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.
References
Configurations
History
No history.
Information
Published : 2018-12-14 20:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20148
Mitre link : CVE-2018-20148
CVE.ORG link : CVE-2018-20148
JSON object : View
Products Affected
wordpress
- wordpress
debian
- debian_linux
CWE
CWE-502
Deserialization of Untrusted Data