CVE-2018-20148
14.12.2018, 20:29
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.Enginsight
Vendor | Product | Version |
---|---|---|
wordpress | wordpress | 𝑥 < 4.9.9 |
wordpress | wordpress | 5.0 ≤ 𝑥 < 5.0.1 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References