| VID |
22825 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
According to its self-reported version number, the WordPress application running on the remote web server is 4.9.x prior to 4.9.1. It is, therefore, affected by multiple vulnerabilities.
- Use a properly generated hash for the newbloguser key instead of a determinate substring.
- Add escaping to the language attributes used on html elements.
- Ensure the attributes of enclosures are correctly escaped in RSS and Atom feeds.
- Remove the ability to upload JavaScript files for users who do not have the unfiltered_html capability.
* References: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
* Platforms affected:
WordPress 4.9.x versions prior to 4.9.1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of WordPress (4.9.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|