In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wordpress | Wordpress | * | 4.9.9 (excluding) |
Wordpress | Wordpress | 5.0 (including) | 5.0.1 (excluding) |
Wordpress | Ubuntu | bionic | * |
Wordpress | Ubuntu | cosmic | * |
Wordpress | Ubuntu | esm-apps/bionic | * |
Wordpress | Ubuntu | esm-apps/xenial | * |
Wordpress | Ubuntu | trusty | * |
Wordpress | Ubuntu | upstream | * |
Wordpress | Ubuntu | xenial | * |