7.5
CVE-2015-7527
- EPSS 7.13%
- Veröffentlicht 17.12.2015 19:59:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Cool Video Gallery <= 1.9 - Authenticated Command Injection
lib/core.php in the Cool Video Gallery plugin 1.9 for WordPress allows remote attackers to execute arbitrary code via shell metacharacters in the "Width of preview image" and possibly other input fields in the "Video Gallery Settings" page.
Mögliche Gegenmaßnahme
Cool Video Gallery: Update to version 2.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Cool Video Gallery
Version
[*, 2.0)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cool Video Gallery Project ≫ Cool Video Gallery Version1.9 SwPlatformwordpress
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 7.13% | 0.913 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.