CVE-2018-19370

A Race condition vulnerability in unzip_file in admin/import/class-import-settings.php in the Yoast SEO (wordpress-seo) plugin before 9.2.0 for WordPress allows an SEO Manager to perform command execution on the Operating System via a ZIP import.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa - Exploit, Third Party Advisory () https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa - Exploit, Third Party Advisory
References () https://wordpress.org/plugins/wordpress-seo/#developers - Product, Third Party Advisory () https://wordpress.org/plugins/wordpress-seo/#developers - Product, Third Party Advisory
References () https://www.youtube.com/watch?v=nL141dcDGCY - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=nL141dcDGCY - Exploit, Third Party Advisory

Information

Published : 2018-11-28 22:29

Updated : 2024-11-21 03:57


NVD link : CVE-2018-19370

Mitre link : CVE-2018-19370

CVE.ORG link : CVE-2018-19370


JSON object : View

Products Affected

yoast

  • yoast_seo
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')