The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site administrator into performing an action such as clicking on a link. This makes it possible for an attacker to create and or modify files hosted on the server which can easily grant attackers backdoor access to the affected server.
References
Configurations
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/orangelabweb/imagemagick-engine/blob/1.7.4/imagemagick-engine.php#L529 - Patch | |
References | () https://github.com/orangelabweb/imagemagick-engine/blob/v.1.7.2/imagemagick-engine.php#L529 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2801283%40imagemagick-engine%2Ftrunk&old=2732430%40imagemagick-engine%2Ftrunk&sfp_email=&sfph_mail= - Patch | |
References | () https://www.exploit-db.com/exploits/51025 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b1f17a83-1df0-44fe-bd86-243cff6ec91b?source=cve - Third Party Advisory | |
References | () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2441 - Third Party Advisory |
27 Oct 2023, 18:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Orangelab imagemagick Engine
Orangelab |
|
CWE | CWE-352 | |
CPE | cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://github.com/orangelabweb/imagemagick-engine/blob/v.1.7.2/imagemagick-engine.php#L529 - Patch | |
References | (MISC) https://www.exploit-db.com/exploits/51025 - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) https://github.com/orangelabweb/imagemagick-engine/blob/1.7.4/imagemagick-engine.php#L529 - Patch | |
References | (MISC) https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2441 - Third Party Advisory | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/b1f17a83-1df0-44fe-bd86-243cff6ec91b?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2801283%40imagemagick-engine%2Ftrunk&old=2732430%40imagemagick-engine%2Ftrunk&sfp_email=&sfph_mail= - Patch |
20 Oct 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-20 08:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-2441
Mitre link : CVE-2022-2441
CVE.ORG link : CVE-2022-2441
JSON object : View
Products Affected
orangelab
- imagemagick_engine
CWE
CWE-352
Cross-Site Request Forgery (CSRF)