Remote Code Execution in ImageMagick Engine Plugin for WordPress
CVE-2022-2441

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
20 October 2023

Summary

The ImageMagick Engine plugin for WordPress contains a vulnerability that allows for remote code execution through the manipulation of the 'cli_path' parameter. This issue affects versions up to and including 1.7.5, enabling unauthenticated users to execute arbitrary commands if they can convince a site administrator to interact with a malicious link. By exploiting this vulnerability, attackers can create or modify files on the server, potentially establishing backdoor access and compromising the security of the website.

Affected Version(s)

ImageMagick Engine * <= 1.7.5

References

EPSS Score

22% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Rasoul Jahanshahi
.