Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 896

github логотип

GHSA-6h9x-74vw-438v

больше 3 лет назад

Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-c3x3-frh6-qx5w

больше 3 лет назад

Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-928v-37ff-2cvr

больше 3 лет назад

Before version 4.8.2, WordPress was susceptible to an open redirect attack in wp-admin/edit-tag-form.php and wp-admin/user-edit.php.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-4f8m-x9c7-gvcq

больше 3 лет назад

Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-7x3g-chv4-38jw

больше 3 лет назад

Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-wg62-5rv2-8hw3

больше 3 лет назад

Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-75fw-m5qw-hfx6

больше 3 лет назад

WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-f63w-32jx-r3r8

больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box.

EPSS: Низкий
github логотип

GHSA-ggq7-6rpp-2v58

больше 3 лет назад

SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field.

EPSS: Низкий
github логотип

GHSA-x7cw-w76m-9h8q

больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-6h9x-74vw-438v

Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

CVSS3: 6.1
3%
Низкий
больше 3 лет назад
github логотип
GHSA-c3x3-frh6-qx5w

Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

CVSS3: 7.5
31%
Средний
больше 3 лет назад
github логотип
GHSA-928v-37ff-2cvr

Before version 4.8.2, WordPress was susceptible to an open redirect attack in wp-admin/edit-tag-form.php and wp-admin/user-edit.php.

CVSS3: 5.4
2%
Низкий
больше 3 лет назад
github логотип
GHSA-4f8m-x9c7-gvcq

Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.

CVSS3: 9.8
10%
Средний
больше 3 лет назад
github логотип
GHSA-7x3g-chv4-38jw

Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.

CVSS3: 6.1
8%
Низкий
больше 3 лет назад
github логотип
GHSA-wg62-5rv2-8hw3

Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor.

CVSS3: 6.1
5%
Низкий
больше 3 лет назад
github логотип
GHSA-75fw-m5qw-hfx6

WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-f63w-32jx-r3r8

Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-ggq7-6rpp-2v58

SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-x7cw-w76m-9h8q

Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться