
Cloud Vulnerability DB
A community-led vulnerabilities database
The ImageMagick Engine WordPress plugin before version 1.7.11 contains a critical OS Command Injection vulnerability (CVE-2024-6486). The vulnerability affects the plugin's handling of the "cli_path" parameter and can be exploited by authenticated users with administrator-level permissions (Wiz).
The vulnerability exists in the ImageMagick Engine plugin's settings page, specifically in the "ImageMagick path" textbox configuration. An authenticated administrator can inject OS commands through the "cli_path" parameter, which is not properly sanitized before being processed by the server, potentially leading to remote code execution on the affected system (WPScan).
If successfully exploited, this vulnerability allows authenticated attackers with administrator-level permissions to execute arbitrary operating system commands on the server. This could lead to complete server compromise through remote code execution (Wiz).
Users should immediately update the ImageMagick Engine plugin to version 1.7.11 or later, which contains the fix for this vulnerability (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."