Vulnerability Details : CVE-2017-5493
wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or (2) user signup.
Exploit prediction scoring system (EPSS) score for CVE-2017-5493
Probability of exploitation activity in the next 30 days: 0.66%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-5493
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
[email protected] |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
[email protected] |
CWE ids for CVE-2017-5493
-
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.Assigned by: [email protected] (Primary)
References for CVE-2017-5493
-
https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Vendor Advisory
- http://www.securitytracker.com/id/1037591
-
https://wpvulndb.com/vulnerabilities/8721
-
http://www.securityfocus.com/bid/95401
-
http://www.openwall.com/lists/oss-security/2017/01/14/6
Mailing List;Third Party Advisory
- http://www.debian.org/security/2017/dsa-3779
-
https://codex.wordpress.org/Version_4.7.1
Release Notes;Vendor Advisory
-
https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
Patch
Products affected by CVE-2017-5493
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*