Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-8351

Опубликовано: 11 сент. 2017
Источник: nvd
CVSS3: 9
CVSS2: 6.8
EPSS Средний

Описание

PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gwolle_guestbook_project:gwolle_guestbook:*:*:*:*:*:wordpress:*:*
Версия до 1.5.3 (включая)

EPSS

Процентиль: 99%
0.69448
Средний

9 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9
github
больше 3 лет назад

PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.

EPSS

Процентиль: 99%
0.69448
Средний

9 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-94