8.8
CVSSv3

CVE-2018-15877

Published: 26/08/2018 Updated: 02/02/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 906
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

The Plainview Activity Monitor plugin prior to 20180826 for WordPress is vulnerable to OS command injection via shell metacharacters in the ip parameter of a wp-admin/admin.php?page=plainview_activity_monitor&tab=activity_tools request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

plainview activity monitor project plainview activity monitor

Exploits

<!-- About: =========== Component: Plainview Activity Monitor (Wordpress plugin) Vulnerable version: 20161228 and possibly prior Fixed version: 20180826 CVE-ID: CVE-2018-15877 CWE-ID: CWE-78 Author: - LydA(c)ric Lefebvre (wwwlinkedincom/in/lydericlefebvre) Timeline: =========== - 2018/08/25: Vulnerability found - 2018/08/25: CVE-ID re ...
WordPress Plainview Activity Monitor plugin version 20161228 suffers from an OS command injection vulnerability ...
WordPress Plainview Activity Monitor plugin version 20161228 authenticated remote code execution exploit ...

Github Repositories

cve-2018-15877

CVE-2018-15877 This is part of Cved: a tool to manage vulnerable docker containers Cved: githubcom/git-rep-src/cved Image source: githubcom/cved-sources/cve-2018-15877 Image author: githubcom/cved-sources/cve-2018-15877

Wordpress Plainview Activity Monitor Plugin RCE (20161228)

CVE-2018-15877-RCE RCE via the Planview Activity Monitor plugin for wordpress Requirements: Python3 Selenium Usage: /exploitpy <domain> <user:pass> <local IP> <local Port>