9.8
CVSSv3

CVE-2018-16283

Published: 24/09/2018 Updated: 14/11/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 756
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Wechat Broadcast plugin 1.2.0 and previous versions for WordPress allows Directory Traversal via the Image.php url parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wechat brodcast project wechat brodcast

Exploits

# Exploit Title: WordPress Plugin Wechat Broadcast 120 - Local File Inclusion # Author: Manuel Garcia Cardenas # Date: 2018-09-19 # Software link: eswordpressorg/plugins/wechat-broadcast/ # CVE: CVE-2018-16283 # Description # This bug was found in the file: /wechat-broadcast/wechat/Imagephp # echo file_get_contents(isset($_GET["url"]) ...

Mailing Lists

============================================= MGC ALERT 2018-005 - Original release date: August 31, 2018 - Last revised: September 19, 2018 - Discovered by: Manuel García Cárdenas - Severity: 9/10 (CVSS Base Score) - CVE-ID: CVE-2018-16283 ============================================= I VULNERABILITY ------------------------- WordPress Plugin ...

Github Repositories

Collection of WordPress Plugin PoC - For Educational Purposes ONLY

WordPress Plugin PoCs WordPress Plugin PoCs based on 1-Day WordPress Plugin Vulnerability ⚠️ Legal Disclaimer - Use At Your Own Risk ⚠️ This project is made for EDUCATIONAL and ETHICAL TESTING purposes ONLY Using of source code in this repository for attacking targets without prior mutual consent is ILLEGAL I take NO responsibility and/or liability for how you choose

cve-2018-16283

CVE-2018-16283 This is part of Cved: a tool to manage vulnerable docker containers Cved: githubcom/git-rep-src/cved Image source: githubcom/cved-sources/cve-2018-16283 Image author: githubcom/cved-sources/cve-2018-16283

Collection of WordPress Plugin PoC - For Educational Purposes ONLY

WordPress Plugin PoCs WordPress Plugin PoCs based on 1-Day WordPress Plugin Vulnerability ⚠️ Legal Disclaimer - Use At Your Own Risk ⚠️ This project is made for EDUCATIONAL and ETHICAL TESTING purposes ONLY Using of source code in this repository for attacking targets without prior mutual consent is ILLEGAL I take NO responsibility and/or liability for how you choose