PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-09-11T20:00:00

Updated: 2018-10-09T18:57:01

Reserved: 2015-11-25T00:00:00


Link: CVE-2015-8351

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2017-09-11T20:29:00.457

Modified: 2018-10-09T19:58:25.503


Link: CVE-2015-8351

JSON object: View

cve-icon Redhat Information

No data.

CWE