CVE-2015-4336
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
17/06/2015
Last modified:
12/04/2025
Description
cloner.functions.php in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to execute arbitrary commands via a file containing filenames with shell metacharacters, as demonstrated by using the backup comments feature to create the file.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:xcloner:xcloner:3.1.2:*:*:*:*:wordpress:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html
- http://www.securityfocus.com/bid/74943
- http://www.vapid.dhs.org/advisory.php?v=121
- http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Execution.html
- http://www.securityfocus.com/bid/74943
- http://www.vapid.dhs.org/advisory.php?v=121



