7.2
CVE-2024-6486
- EPSS 1.32%
- Veröffentlicht 15.05.2025 20:15:55
- Zuletzt bearbeitet 11.06.2025 15:40:01
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
ImageMagick Engine <= 1.7.10 - Authenticated (Administrator+) Remote Code Execution
The ImageMagick Engine ImageMagick Engine WordPress plugin before 1.7.11 for WordPress is vulnerable to OS Command Injection via the "cli_path" parameter. This allows authenticated attackers, with administrator-level permission to execute arbitrary OS commands on the server leading to remote code execution.
Mögliche Gegenmaßnahme
ImageMagick Engine: Update to version 1.7.11, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
ImageMagick Engine
Version
*-1.7.10
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Orangelab ≫ Imagemagick Engine SwPlatformwordpress Version < 1.7.11
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.32% | 0.794 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.