Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
WordPress Multiple Vulnerabilities (Security Release) - December 2018 (Linux)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is running WordPress and is prone to multiple vulnerabilities.
Insight
Insight
The following vulnerabilities exist: - Authors could alter meta data to delete files that they weren't authorized to. - Authors could create posts of unauthorized post types with specially crafted input. - Contributors could craft meta data in a way that resulted in PHP object injection. - Contributors could edit new comments from higher-privileged users, potentially leading to a cross-site scripting vulnerability. - Specially crafted URL inputs could lead to a cross-site scripting vulnerability in some circumstances. WordPress itself was not affected, but plugins could be in some situations. - The user activation screen could be indexed by search engines in some uncommon configurations, leading to exposure of email addresses, and in some rare cases, default generated passwords. - Authors on Apache-hosted sites could upload specifically crafted files that bypass MIME verification, leading to a cross-site scripting vulnerability.
Affected Software
Affected Software
All versions since WordPress 3.7 up to 5.0.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
The issues have been fixed in version 5.0.1. Updated versions of WordPress 4.9 and older releases are also available. Please see the references for more information.