Vulnerability Details : CVE-2022-21663
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Exploit prediction scoring system (EPSS) score for CVE-2022-21663
Probability of exploitation activity in the next 30 days: 0.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-21663
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
[email protected] |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
[email protected] |
6.6
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.7
|
5.9
|
[email protected] |
CWE ids for CVE-2022-21663
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by:
- [email protected] (Secondary)
- [email protected] (Secondary)
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: [email protected] (Primary)
References for CVE-2022-21663
-
https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
Mailing List;Third Party Advisory
-
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h
Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
Mailing List;Third Party Advisory
-
https://blog.sonarsource.com/wordpress-object-injection-vulnerability/
Exploit;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5039
Third Party Advisory
-
https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
Release Notes;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
Mailing List;Third Party Advisory
Products affected by CVE-2022-21663
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*