Korean
<< Back
VID 22825
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its self-reported version number, the WordPress application running on the remote web server is 4.9.x prior to 4.9.1. It is, therefore, affected by multiple vulnerabilities. - Use a properly generated hash for the newbloguser key instead of a determinate substring. - Add escaping to the language attributes used on html elements. - Ensure the attributes of enclosures are correctly escaped in RSS and Atom feeds.

- Remove the ability to upload JavaScript files for users who do not have the unfiltered_html capability.

* References:
https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/

* Platforms affected:
WordPress 4.9.x versions prior to 4.9.1
Any operating system Any version
Recommendation Upgrade to the latest version of WordPress (4.9.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)