7.2
CVSSv3

CVE-2019-17575

Published: 14/10/2019 Updated: 21/07/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and previous versions. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wbce wbce cms