The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
Max Base Score | 7.5 |
Published | 2017-04-03 |
Updated | 2019-10-03 |
EPSS | 97.27% |
wp-includes/feed.php in WordPress before 4.9.1 does not properly restrict enclosures in RSS and Atom fields, which might allow attackers to conduct XSS attacks via a crafted URL.
Max Base Score | 5.4 |
Published | 2017-12-02 |
Updated | 2019-04-26 |
EPSS | 0.10% |
wp-includes/general-template.php in WordPress before 4.9.1 does not properly restrict the lang attribute of an HTML element, which might allow attackers to conduct XSS attacks via the language setting of a site.
Max Base Score | 5.4 |
Published | 2017-12-02 |
Updated | 2019-04-26 |
EPSS | 0.09% |
wp-includes/functions.php in WordPress before 4.9.1 does not require the unfiltered_html capability for upload of .js files, which might allow remote attackers to conduct XSS attacks via a crafted file.
Max Base Score | 5.4 |
Published | 2017-12-02 |
Updated | 2019-04-26 |
EPSS | 0.09% |
wp-admin/user-new.php in WordPress before 4.9.1 sets the newbloguser key to a string that can be directly derived from the user ID, which allows remote attackers to bypass intended access restrictions by entering this string.
Max Base Score | 8.8 |
Published | 2017-12-02 |
Updated | 2019-10-03 |
EPSS | 0.38% |
WordPress before 4.8.3 is affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi) in plugins and themes, as demonstrated by a "double prepare" approach, a different vulnerability than CVE-2017-14723.
Max Base Score | 9.8 |
Published | 2017-11-02 |
Updated | 2018-02-04 |
EPSS | 0.39% |
WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
Max Base Score | 6.5 |
Published | 2017-10-03 |
Updated | 2019-10-03 |
EPSS | 0.11% |
Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor.
Max Base Score | 6.1 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.38% |
Before version 4.8.2, WordPress was susceptible to an open redirect attack in wp-admin/edit-tag-form.php and wp-admin/user-edit.php.
Max Base Score | 5.4 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.14% |
Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.
Max Base Score | 6.1 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.37% |
Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
Max Base Score | 9.8 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.38% |
Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.
Max Base Score | 7.5 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.30% |
Before version 4.8.2, WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.
Max Base Score | 6.1 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.25% |
Before version 4.8.2, WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.
Max Base Score | 6.1 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.25% |
Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
Max Base Score | 7.5 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.47% |
Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.
Max Base Score | 6.1 |
Published | 2017-09-23 |
Updated | 2017-11-10 |
EPSS | 0.25% |
In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
Max Base Score | 8.6 |
Published | 2017-05-18 |
Updated | 2019-03-15 |
EPSS | 1.08% |
In WordPress before 4.7.5, there is a lack of capability checks for post meta data in the XML-RPC API.
Max Base Score | 7.5 |
Published | 2017-05-18 |
Updated | 2019-03-15 |
EPSS | 0.77% |
In WordPress before 4.7.5, a Cross Site Request Forgery (CSRF) vulnerability exists in the filesystem credentials dialog because a nonce is not required for updating credentials.
Max Base Score | 8.8 |
Published | 2017-05-18 |
Updated | 2019-03-15 |
EPSS | 0.44% |
In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability related to the Customizer exists, involving an invalid customization session.
Max Base Score | 6.1 |
Published | 2017-05-18 |
Updated | 2019-03-15 |
EPSS | 0.29% |
In WordPress before 4.7.5, there is improper handling of post meta data values in the XML-RPC API.
Max Base Score | 8.6 |
Published | 2017-05-18 |
Updated | 2019-10-03 |
EPSS | 0.62% |
In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability exists when attempting to upload very large files, because the error message does not properly restrict presentation of the filename.
Max Base Score | 6.1 |
Published | 2017-05-18 |
Updated | 2019-03-15 |
EPSS | 0.29% |
WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: (1) the attacker can prevent the victim from receiving any e-mail messages for an extended period of time (such as 5 days), (2) the victim's e-mail system sends an autoresponse containing the original message, or (3) the victim manually composes a reply containing the original message.
Max Base Score | 5.9 |
Published | 2017-05-04 |
Updated | 2017-11-04 |
EPSS | 2.83% |
In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.
Max Base Score | 6.5 |
Published | 2017-03-12 |
Updated | 2019-03-19 |
EPSS | 0.16% |
In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names.
Max Base Score | 6.1 |
Published | 2017-03-12 |
Updated | 2019-03-19 |
EPSS | 0.32% |