Vulnerability Details : CVE-2017-1001000
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
Exploit prediction scoring system (EPSS) score for CVE-2017-1001000
Probability of exploitation activity in the next 30 days: 97.27%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2017-1001000
-
WordPress REST API Content Injection
Disclosure Date : 2017-02-01auxiliary/scanner/http/wordpress_content_injectionThis module exploits a content injection vulnerability in WordPress versions 4.7 and 4.7.1 via type juggling in the REST API. Authors: - Marc Montpas - wvu <[email protected]>
CVSS scores for CVE-2017-1001000
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
[email protected] |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
[email protected] |
References for CVE-2017-1001000
-
https://codex.wordpress.org/Version_4.7.2
Patch;Vendor Advisory
-
https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab
Issue Tracking;Patch;Third Party Advisory
-
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
Technical Description;Third Party Advisory
-
https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/
Patch;Vendor Advisory
-
https://blogs.akamai.com/2017/02/wordpress-web-api-vulnerability.html
Exploit;Third Party Advisory
-
https://github.com/WordPress/WordPress/commit/e357195ce303017d517aff944644a7a1232926f7
Issue Tracking;Patch;Third Party Advisory
- http://www.securitytracker.com/id/1037731
-
http://www.openwall.com/lists/oss-security/2017/02/10/16
Mailing List;Patch;Third Party Advisory
-
https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
Patch;Release Notes;Vendor Advisory
Products affected by CVE-2017-1001000
- cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*