cve/2015/CVE-2015-7527.md

19 lines
810 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-7527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7527)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
lib/core.php in the Cool Video Gallery plugin 1.9 for WordPress allows remote attackers to execute arbitrary code via shell metacharacters in the "Width of preview image" and possibly other input fields in the "Video Gallery Settings" page.
### POC
#### Reference
- http://packetstormsecurity.com/files/134626/WordPress-Cool-Video-Gallery-1.9-Command-Injection.html
- https://wpvulndb.com/vulnerabilities/8348
#### Github
- https://github.com/ARPSyndicate/cvemon