VID |
210173 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its self-reported version number, the WordPress application running on the remote web server is affected by multiple vulnerabilities: - A cross-site request forgery (XSRF) vulnerability exists in the comment form due to improper validation. A remote attacker can exploit this by tricking a user into visiting a specially crafted web page, allowing the attacker to create comments on the administrator's behalf. - A cross-site scripting (XSS) vulnerability exists due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.
* References: https://wordpress.org/support/wordpress-version/version-5-1-1/
* Platforms Affected: WordPress prior to 5.1.1 Any operating system Any version |
Recommendation |
Upgrade to the version (5.1.1 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|