Vulnerability Details : CVE-2018-6195
Potential exploit
admin/partials/wp-splashing-admin-main.php in the Splashing Images plugin (wp-splashing-images) before 2.1.1 for WordPress allows authenticated (administrator, editor, or author) remote attackers to conduct PHP Object Injection attacks via crafted serialized data in the 'session' HTTP GET parameter to wp-admin/upload.php.
Products affected by CVE-2018-6195
- cpe:2.3:a:splashing_images_project:splashing_images:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-6195
2.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-6195
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2018-6195
-
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-6195
-
http://packetstormsecurity.com/files/146109/WordPress-Splashing-Images-2.1-Cross-Site-Scripting-PHP-Object-Injection.html
WordPress Splashing Images 2.1 Cross Site Scripting / PHP Object Injection ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2018/Jan/91
Full Disclosure: [CVE-2018-6194, CVE-2018-6195] PHP Object Injection + XSS in WordPress Splashing Images PluginExploit;Mailing List;Third Party Advisory
-
https://plugins.trac.wordpress.org/changeset/1807349/wp-splashing-images
Changeset 1807349 for wp-splashing-images – WordPress Plugin RepositoryPatch;Vendor Advisory
-
https://wpvulndb.com/vulnerabilities/9015
Splashing Images <= 2.1 - Authenticated PHP Object InjectionThird Party Advisory
Jump to