is_blog_installed in wp-includes/functions.php in WordPress before 5.5.2 improperly determines whether WordPress is already installed, which might allow an attacker to perform a new installation, leading to remote code execution (as well as a denial of service for the old installation).
Max Base Score | 9.8 |
Published | 2020-11-02 |
Updated | 2022-04-28 |
EPSS | 3.27% |
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
Max Base Score | 7.5 |
Published | 2018-02-06 |
Updated | 2019-03-01 |
EPSS | 35.51% |
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
Max Base Score | 7.1 |
Published | 2017-01-18 |
Updated | 2017-09-03 |
EPSS | 32.65% |
The oEmbed protocol implementation in WordPress before 4.5.3 allows remote attackers to cause a denial of service via unspecified vectors.
Max Base Score | 7.5 |
Published | 2016-06-29 |
Updated | 2018-07-31 |
EPSS | 1.17% |
Cross-site request forgery (CSRF) vulnerability in wp-admin/post.php in WordPress before 4.2.4 allows remote attackers to hijack the authentication of administrators for requests that lock a post, and consequently cause a denial of service (editing blockage), via a get-post-lock action.
Max Base Score | 6.8 |
Published | 2015-11-09 |
Updated | 2017-11-04 |
EPSS | 0.87% |
wp-includes/class-phpass.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to cause a denial of service (CPU consumption) via a long password that is improperly handled during hashing, a similar issue to CVE-2014-9016.
Max Base Score | 5.0 |
Published | 2014-11-25 |
Updated | 2016-04-04 |
EPSS | 27.79% |
The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, does not limit the number of elements in an XML document, which allows remote attackers to cause a denial of service (CPU consumption) via a large document, a different vulnerability than CVE-2014-5265.
Max Base Score | 5.0 |
Published | 2014-08-18 |
Updated | 2015-11-25 |
EPSS | 94.72% |
The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, permits entity declarations without considering recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
Max Base Score | 5.0 |
Published | 2014-08-18 |
Updated | 2015-11-25 |
EPSS | 50.32% |
wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie.
Max Base Score | 4.3 |
Published | 2013-06-21 |
Updated | 2013-08-22 |
EPSS | 1.68% |
** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not limit the number of MySQL queries sent to external MySQL database servers, which allows remote attackers to use WordPress as a proxy for brute-force attacks or denial of service attacks via the dbhost parameter, a different vulnerability than CVE-2011-4898. NOTE: the vendor disputes the significance of this issue because an incomplete WordPress installation might be present on the network for only a short time.
Max Base Score | 5.0 |
Published | 2012-01-30 |
Updated | 2012-01-31 |
EPSS | 0.73% |
The make_clickable function in wp-includes/formatting.php in WordPress before 3.1.1 does not properly check URLs before passing them to the PCRE library, which allows remote attackers to cause a denial of service (crash) via a comment with a crafted URL that triggers many recursive calls.
Max Base Score | 5.0 |
Published | 2012-06-27 |
Updated | 2012-06-28 |
EPSS | 1.55% |
Algorithmic complexity vulnerability in wp-trackback.php in WordPress before 2.8.5 allows remote attackers to cause a denial of service (CPU consumption and server hang) via a long title parameter in conjunction with a charset parameter composed of many comma-separated "UTF-8" substrings, related to the mb_convert_encoding function in PHP.
Max Base Score | 4.3 |
Published | 2009-10-23 |
Updated | 2017-11-21 |
EPSS | 3.36% |
wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.
Max Base Score | 4.9 |
Published | 2009-07-10 |
Updated | 2018-10-10 |
EPSS | 18.27% |
wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request.
Max Base Score | 10.0 |
Published | 2009-04-28 |
Updated | 2017-08-17 |
EPSS | 0.65% |
WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.
Max Base Score | 4.0 |
Published | 2008-11-17 |
Updated | 2017-08-08 |
EPSS | 0.17% |
Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1.
Max Base Score | 7.5 |
Published | 2008-01-10 |
Updated | 2018-10-15 |
EPSS | 1.01% |
WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data.
Max Base Score | 5.0 |
Published | 2007-01-29 |
Updated | 2018-10-16 |
EPSS | 4.01% |
The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.
Max Base Score | 7.8 |
Published | 2007-01-29 |
Updated | 2018-10-16 |
EPSS | 0.92% |
WordPress before 2.0.5 does not properly store a profile containing a string representation of a serialized object, which allows remote authenticated users to cause a denial of service (application crash) via a string that represents a (1) malformed or (2) large serialized object, because the object triggers automatic unserialization for display.
Max Base Score | 4.0 |
Published | 2006-11-21 |
Updated | 2008-09-05 |
EPSS | 0.28% |
19 vulnerabilities found