Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 894

github логотип

GHSA-vhg8-r42v-3qpv

около 3 лет назад

Cross-site request forgery (CSRF) vulnerability in the widget-editing accessibility-mode feature in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims for requests that perform a widgets-access action, related to wp-admin/includes/class-wp-screen.php and wp-admin/widgets.php.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-qf7h-2v85-whcw

около 3 лет назад

Cross-site request forgery (CSRF) vulnerability in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims via vectors involving a Flash file upload.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-p45m-x7rq-w3r2

около 3 лет назад

Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-q9q8-86p8-22rj

около 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xr65-2gpf-fj8v

около 3 лет назад

WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: (1) the attacker can prevent the victim from receiving any e-mail messages for an extended period of time (such as 5 days), (2) the victim's e-mail system sends an autoresponse containing the original message, or (3) the victim manually composes a reply containing the original message.

CVSS3: 5.9
EPSS: Средний
github логотип

GHSA-xw73-224j-wrf4

около 3 лет назад

Before version 4.8.2, WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xmq7-vcg4-jfj9

около 3 лет назад

Before version 4.8.2, WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-c3x3-frh6-qx5w

около 3 лет назад

Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-6h9x-74vw-438v

около 3 лет назад

Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-8rmg-wmq4-q93v

около 3 лет назад

Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-vhg8-r42v-3qpv

Cross-site request forgery (CSRF) vulnerability in the widget-editing accessibility-mode feature in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims for requests that perform a widgets-access action, related to wp-admin/includes/class-wp-screen.php and wp-admin/widgets.php.

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-qf7h-2v85-whcw

Cross-site request forgery (CSRF) vulnerability in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims via vectors involving a Flash file upload.

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-p45m-x7rq-w3r2

Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-q9q8-86p8-22rj

Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-xr65-2gpf-fj8v

WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: (1) the attacker can prevent the victim from receiving any e-mail messages for an extended period of time (such as 5 days), (2) the victim's e-mail system sends an autoresponse containing the original message, or (3) the victim manually composes a reply containing the original message.

CVSS3: 5.9
62%
Средний
около 3 лет назад
github логотип
GHSA-xw73-224j-wrf4

Before version 4.8.2, WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.

CVSS3: 6.1
2%
Низкий
около 3 лет назад
github логотип
GHSA-xmq7-vcg4-jfj9

Before version 4.8.2, WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.

CVSS3: 6.1
2%
Низкий
около 3 лет назад
github логотип
GHSA-c3x3-frh6-qx5w

Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

CVSS3: 7.5
28%
Средний
около 3 лет назад
github логотип
GHSA-6h9x-74vw-438v

Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

CVSS3: 6.1
2%
Низкий
около 3 лет назад
github логотип
GHSA-8rmg-wmq4-q93v

Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.

CVSS3: 7.5
48%
Средний
около 3 лет назад

Уязвимостей на страницу


Поделиться