Input validation vulnerability in WordPress 3.7

WordPress versions before 4.9.9 and 5.x before 5.0.1 have a security vulnerability that allows someone with author privileges to execute arbitrary code. This is done by changing a Post Meta entry to an arbitrary string ending with a “”.jpg?file.php”” substring and then uploading a specially crafted image containing PHP code in the Exif metadata. This vulnerability is identified by the name CVE-2019-8943.

Detected in:

WordPress fixed vulnerable versions: >= * < 3.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.