CVE-2015-8351
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
11/09/2017
Last modified:
20/04/2025
Description
PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.
Impact
Base Score 3.x
9.00
Severity 3.x
CRITICAL
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gwolle_guestbook_project:gwolle_guestbook:*:*:*:*:*:wordpress:*:* | 1.5.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html
- http://www.securityfocus.com/archive/1/537020/100/0/threaded
- https://wordpress.org/plugins/gwolle-gb/changelog/
- https://www.exploit-db.com/exploits/38861/
- https://www.htbridge.com/advisory/HTB23275
- http://packetstormsecurity.com/files/134599/WordPress-Gwolle-Guestbook-1.5.3-Remote-File-Inclusion.html
- http://www.securityfocus.com/archive/1/537020/100/0/threaded
- https://wordpress.org/plugins/gwolle-gb/changelog/
- https://www.exploit-db.com/exploits/38861/
- https://www.htbridge.com/advisory/HTB23275



