CVE-2015-8351
high-risk
Published 2017-09-11
PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
Do I need to act?
!
69.4% chance of exploitation in next 30 days
EPSS score — higher than 31% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.0/10
Critical
NETWORK
/ HIGH complexity
Affected Products (1)
Gwolle Guestbook
Affected Vendors
References (10)
Third Party Advisory
http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Rem...
Third Party Advisory
https://wordpress.org/plugins/gwolle-gb/changelog/
Third Party Advisory
https://www.exploit-db.com/exploits/38861/
Third Party Advisory
https://www.htbridge.com/advisory/HTB23275
Third Party Advisory
http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Rem...
Third Party Advisory
https://wordpress.org/plugins/gwolle-gb/changelog/
Third Party Advisory
https://www.exploit-db.com/exploits/38861/
Third Party Advisory
https://www.htbridge.com/advisory/HTB23275
50
/ 100
high-risk
Severity
26/34 · High
Exploitability
19/34 · Moderate
Exposure
5/34 · Minimal