Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5715

Опубликовано: 22 мая 2016
Источник: debian
EPSS Средний

Описание

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed4.3.1+dfsg-1package

Примечания

  • https://wordpress.org/news/2015/09/wordpress-4-3-1/

  • https://github.com/WordPress/WordPress/commit/9c57f3a4291f2311ae05f22c10eedeb0f69337ab

EPSS

Процентиль: 97%
0.34443
Средний

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 9 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

CVSS3: 4.3
nvd
около 9 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

CVSS3: 4.3
github
около 3 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

EPSS

Процентиль: 97%
0.34443
Средний