CVE-2018-20148
WordPress Core < 5.0.1 - PHP Object Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.
En WordPress, en versiones anteriores a la 4.9.9 y versiones 5.x anteriores a la 5.0.1, los contribuyentes pueden llevar a cabo ataques de inyección de objetos PHP mediante metadatos manipulados en una llamada wp.getMediaItem. Esto viene provocado por la gestión incorrecta de datos serializados en URL phar:// en la función wp_get_attachment_thumb_file en wp-includes/post.php.
Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and PHP injections attacks, delete files, leak potentially sensitive data, create posts of unauthorized types, or cause denial-of-service by application crash.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-12 CVE Published
- 2018-12-14 CVE Reserved
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106220 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html | Mailing List |
|
https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords | Media Coverage | |
https://www.zdnet.com/article/wordpress-vulnerability-affects-a-third-of-most-popular-websites-online | Media Coverage |
URL | Date | SRC |
---|---|---|
https://github.com/nth347/CVE-2018-20148_exploit | 2024-09-04 | |
https://blog.secarma.co.uk/labs/near-phar-dangerous-unserialization-wherever-you-are | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://codex.wordpress.org/Version_4.9.9 | 2019-03-04 | |
https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release | 2019-03-04 | |
https://wordpress.org/support/wordpress-version/version-5-0-1 | 2019-03-04 | |
https://wpvulndb.com/vulnerabilities/9171 | 2019-03-04 | |
https://www.debian.org/security/2019/dsa-4401 | 2019-03-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | < 4.9.9 Search vendor "Wordpress" for product "Wordpress" and version " < 4.9.9" | - |
Affected
| ||||||
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | >= 5.0 < 5.0.1 Search vendor "Wordpress" for product "Wordpress" and version " >= 5.0 < 5.0.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|