Loading HuntDB...

CVE-2016-6565

UNKNOWN
Published 2018-07-13T20:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2016-6565. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

WordPress Vulnerability

Identified and analyzed by Wordfence

Software Type

Plugin

Patch Status

Patched

Published

November 15, 2016

Software Details

Software Name

Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery

Software Slug

nextgen-gallery

Affected Versions

* - 2.1.56

Patched Versions

2.1.57

Remediation

Update to version 2.1.57, or a newer patched version

© Defiant Inc. Data provided by Wordfence.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-vhm5-wrvh-3x4h

Advisory Details

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: May 13, 2022, Modified: May 13, 2022

References

Published: 2018-07-13T20:00:00
Last Modified: 2024-08-06T01:36:28.098Z
Copied to clipboard!