Wordpress : Security Vulnerabilities (Information Leak)
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release.
Max Base Score | 6.8 |
Published | 2021-09-09 |
Updated | 2022-08-05 |
EPSS | 0.07% |
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been patched in WordPress 5.8.1, along with any older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.
Max Base Score | 5.3 |
Published | 2021-09-09 |
Updated | 2021-12-14 |
EPSS | 0.09% |
Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.
Max Base Score | 6.5 |
Published | 2021-04-15 |
Updated | 2021-04-23 |
EPSS | 0.46% |
In WordPress before 5.2.4, unauthenticated viewing of certain content is possible because the static query property is mishandled.
Max Base Score | 5.3 |
Published | 2019-10-17 |
Updated | 2023-02-03 |
EPSS | 1.58% |
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.
Max Base Score | 7.5 |
Published | 2018-12-14 |
Updated | 2019-03-04 |
EPSS | 0.97% |
WordPress 4.7.2 mishandles listings of post authors, which allows remote attackers to obtain sensitive information (Path Disclosure) via a /wp-json/oembed/1.0/embed?url= request, related to the "author_name":" substring.
Max Base Score | 5.3 |
Published | 2019-05-22 |
Updated | 2019-05-27 |
EPSS | 0.18% |
wp-admin/includes/class-wp-press-this.php in Press This in WordPress before 4.7.2 does not properly restrict visibility of a taxonomy-assignment user interface, which allows remote attackers to bypass intended access restrictions by reading terms.
Max Base Score | 5.3 |
Published | 2017-01-30 |
Updated | 2019-03-19 |
EPSS | 0.53% |
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
Max Base Score | 5.3 |
Published | 2017-01-15 |
Updated | 2017-09-01 |
EPSS | 97.18% |
WordPress before 4.5.3 allows remote attackers to obtain sensitive revision-history information by leveraging the ability to read a post, related to wp-admin/includes/ajax-actions.php and wp-admin/revision.php.
Max Base Score | 7.5 |
Published | 2016-06-29 |
Updated | 2016-11-30 |
EPSS | 0.57% |
The sanitize_widget_instance function in wp-includes/class-wp-customize-widgets.php in WordPress before 4.2.4 does not use a constant-time comparison for widgets, which allows remote attackers to conduct a timing side-channel attack by measuring the delay before inequality is calculated.
Max Base Score | 5.0 |
Published | 2015-11-09 |
Updated | 2017-09-21 |
EPSS | 0.73% |
WordPress before 3.5.2 allows remote attackers to read arbitrary files via an oEmbed XML provider response containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Max Base Score | 4.3 |
Published | 2013-07-08 |
Updated | 2013-10-07 |
EPSS | 0.36% |
WordPress 3.4.2 does not invalidate a wordpress_sec session cookie upon an administrator's logout action, which makes it easier for remote attackers to discover valid session identifiers via a brute-force attack, or modify data via a replay attack.
Max Base Score | 2.6 |
Published | 2012-12-27 |
Updated | 2013-01-08 |
EPSS | 0.26% |
** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters. NOTE: the vendor disputes the significance of this issue; also, it is unclear whether providing intentionally vague error messages during installation would be reasonable from a usability perspective.
Max Base Score | 5.0 |
Published | 2012-01-30 |
Updated | 2012-01-31 |
EPSS | 0.91% |
WordPress 2.9.2 and 3.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by wp-admin/includes/user.php and certain other files.
Max Base Score | 5.0 |
Published | 2011-09-24 |
Updated | 2012-05-21 |
EPSS | 0.33% |
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 treats unattached attachments as published, which might allow remote attackers to obtain sensitive data via vectors related to wp-includes/post.php.
Max Base Score | 5.0 |
Published | 2011-08-10 |
Updated | 2017-08-29 |
EPSS | 0.56% |
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.
Max Base Score | 5.0 |
Published | 2011-08-10 |
Updated | 2017-08-29 |
EPSS | 0.38% |
wp-admin/async-upload.php in the media uploader in WordPress before 3.0.5 allows remote authenticated users to read (1) draft posts or (2) private posts via a modified attachment_id parameter.
Max Base Score | 4.0 |
Published | 2011-03-14 |
Updated | 2017-11-22 |
EPSS | 0.16% |
WordPress 2.0.11 and earlier allows remote attackers to obtain sensitive information via an empty value of the page parameter to certain PHP scripts under wp-admin/, which reveals the path in various error messages.
Max Base Score | 5.0 |
Published | 2008-01-10 |
Updated | 2018-10-15 |
EPSS | 0.57% |
WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.
Max Base Score | 5.0 |
Published | 2008-01-10 |
Updated | 2018-10-15 |
EPSS | 0.51% |
19 vulnerabilities found