VID |
22825 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its self-reported version number, the WordPress application running on the remote web server is 4.9.x prior to 4.9.1. It is, therefore, affected by multiple vulnerabilities.
- Use a properly generated hash for the newbloguser key instead of a determinate substring.
- Add escaping to the language attributes used on html elements.
- Ensure the attributes of enclosures are correctly escaped in RSS and Atom feeds.
- Remove the ability to upload JavaScript files for users who do not have the unfiltered_html capability.
* References: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
* Platforms affected:
WordPress 4.9.x versions prior to 4.9.1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of WordPress (4.9.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|