Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.46.56.66.76.86.920232024202520262027

Недавние уязвимости WordPress

Количество 1 906

debian логотип

CVE-2024-4439

почти 2 года назад

WordPress Core is vulnerable to Stored Cross-Site Scripting via user d ...

CVSS3: 7.2
EPSS: Критический
ubuntu логотип

CVE-2024-4439

почти 2 года назад

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.

CVSS3: 7.2
EPSS: Критический
fstec логотип

BDU:2024-03714

почти 2 года назад

Уязвимость модуля «Avatar» («Аватар») системы управления содержимым сайта WordPress, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных и провести атаку межсайтового скриптинга (XSS)

CVSS3: 7.2
EPSS: Критический
fstec логотип

BDU:2024-03558

почти 2 года назад

Уязвимость плагина WP Encryption системы управления содержимым сайта WordPress, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-31211

почти 2 года назад

WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.

CVSS3: 5.5
EPSS: Средний
debian логотип

CVE-2024-31211

почти 2 года назад

WordPress is an open publishing platform for the Web. Unserialization ...

CVSS3: 5.5
EPSS: Средний
nvd логотип

CVE-2024-31210

почти 2 года назад

WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2024-31210

почти 2 года назад

WordPress is an open publishing platform for the Web. It's possible fo ...

CVSS3: 7.6
EPSS: Низкий
ubuntu логотип

CVE-2024-31210

почти 2 года назад

WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sit...

CVSS3: 7.6
EPSS: Низкий
ubuntu логотип

CVE-2024-31211

почти 2 года назад

WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.

CVSS3: 5.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2024-4439

WordPress Core is vulnerable to Stored Cross-Site Scripting via user d ...

CVSS3: 7.2
92%
Критический
почти 2 года назад
ubuntu логотип
CVE-2024-4439

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.

CVSS3: 7.2
92%
Критический
почти 2 года назад
fstec логотип
BDU:2024-03714

Уязвимость модуля «Avatar» («Аватар») системы управления содержимым сайта WordPress, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных и провести атаку межсайтового скриптинга (XSS)

CVSS3: 7.2
92%
Критический
почти 2 года назад
fstec логотип
BDU:2024-03558

Уязвимость плагина WP Encryption системы управления содержимым сайта WordPress, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
1%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-31211

WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.

CVSS3: 5.5
45%
Средний
почти 2 года назад
debian логотип
CVE-2024-31211

WordPress is an open publishing platform for the Web. Unserialization ...

CVSS3: 5.5
45%
Средний
почти 2 года назад
nvd логотип
CVE-2024-31210

WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites

CVSS3: 7.6
0%
Низкий
почти 2 года назад
debian логотип
CVE-2024-31210

WordPress is an open publishing platform for the Web. It's possible fo ...

CVSS3: 7.6
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2024-31210

WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sit...

CVSS3: 7.6
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2024-31211

WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.

CVSS3: 5.5
45%
Средний
почти 2 года назад

Уязвимостей на страницу


Поделиться