Описание
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | not-affected | 4.3.1+dfsg-1 |
cosmic | not-affected | 4.3.1+dfsg-1 |
devel | not-affected | 4.3.1+dfsg-1 |
disco | not-affected | 4.3.1+dfsg-1 |
esm-apps/bionic | not-affected | 4.3.1+dfsg-1 |
esm-apps/xenial | not-affected | 4.3.1+dfsg-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
precise | ignored | end of life |
precise/esm | DNE | precise was needs-triage |
Показывать по
EPSS
4 Medium
CVSS2
4.3 Medium
CVSS3
Связанные уязвимости
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in ...
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
EPSS
4 Medium
CVSS2
4.3 Medium
CVSS3