Описание
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 4.3.1+dfsg-1 |
| cosmic | not-affected | 4.3.1+dfsg-1 |
| devel | not-affected | 4.3.1+dfsg-1 |
| disco | not-affected | 4.3.1+dfsg-1 |
| esm-apps/bionic | not-affected | 4.3.1+dfsg-1 |
| esm-apps/xenial | not-affected | 4.3.1+dfsg-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needs-triage |
Показывать по
4 Medium
CVSS2
4.3 Medium
CVSS3
Связанные уязвимости
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in ...
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
4 Medium
CVSS2
4.3 Medium
CVSS3