Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 894

ubuntu логотип

CVE-2018-14028

около 7 лет назад

In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2018-12895

около 7 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
EPSS: Средний
debian логотип

CVE-2018-12895

около 7 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code ...

CVSS3: 8.8
EPSS: Средний
ubuntu логотип

CVE-2018-12895

около 7 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
EPSS: Средний
nvd логотип

CVE-2018-10102

больше 7 лет назад

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2018-10102

больше 7 лет назад

Before WordPress 4.9.5, the version string was not escaped in the get_ ...

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-10101

больше 7 лет назад

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2018-10101

больше 7 лет назад

Before WordPress 4.9.5, the URL validator assumed URLs with the hostna ...

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-10100

больше 7 лет назад

Before WordPress 4.9.5, the redirection URL for the login page was not validated or sanitized if forced to use HTTPS.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2018-10100

больше 7 лет назад

Before WordPress 4.9.5, the redirection URL for the login page was not ...

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2018-14028

In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.

CVSS3: 7.2
4%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-12895

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
37%
Средний
около 7 лет назад
debian логотип
CVE-2018-12895

WordPress through 4.9.6 allows Author users to execute arbitrary code ...

CVSS3: 8.8
37%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-12895

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
37%
Средний
около 7 лет назад
nvd логотип
CVE-2018-10102

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
3%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-10102

Before WordPress 4.9.5, the version string was not escaped in the get_ ...

CVSS3: 6.1
3%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-10101

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
7%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-10101

Before WordPress 4.9.5, the URL validator assumed URLs with the hostna ...

CVSS3: 6.1
7%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-10100

Before WordPress 4.9.5, the redirection URL for the login page was not validated or sanitized if forced to use HTTPS.

CVSS3: 6.1
5%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-10100

Before WordPress 4.9.5, the redirection URL for the login page was not ...

CVSS3: 6.1
5%
Низкий
больше 7 лет назад

Уязвимостей на страницу


Поделиться