admin/partials/wp-splashing-admin-main.php in the Splashing Images plugin (wp-splashing-images) before 2.1.1 for WordPress allows authenticated (administrator, editor, or author) remote attackers to conduct PHP Object Injection attacks via crafted serialized data in the 'session' HTTP GET parameter to wp-admin/upload.php.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/1807349/wp-splashing-images | Patch Vendor Advisory |
http://seclists.org/fulldisclosure/2018/Jan/91 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html | Exploit Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/9015 | Third Party Advisory |
Configurations
Information
Published : 2018-01-30 12:29
Updated : 2022-12-02 11:09
NVD link : CVE-2018-6195
Mitre link : CVE-2018-6195
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
splashing_images_project
- splashing_images