| VID |
22958 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
According to its self-reported version number, the installation of WordPress installed on the remote host is affected by multiple vulnerabilities:
- A deserialization vulnerability exists in wp-includes/Requests/Utility/FilteredIterator.php. An unauthenticated, remote attacker can exploit this, by sending specially crafted serialized payloads to an affected instance, to execute arbitrary code on the target host (CVE-2020-28032).
- Multiple privilege escalation vulnerabilities exist in the XML-RPC component of Wordpress. An unauthenticated, remote attacker can exploit these, to gain privileged access to an affected host (CVE-2020-28035, CVE-2020-28036).
- A remote code execution vulnerability exists in the is_blog_installed function of wp-includes/functions.php. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands (CVE-2020-28037)
* References: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ https://wordpress.org/support/wordpress-version/version-5-5-2/
* Platforms Affected: WordPress prior to 5.5.2 Any operating system Any version |
| Recommendation |
Upgrade to the version (5.5.2 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/ |
| Related URL |
CVE-2020-28032,CVE-2020-28033,CVE-2020-28034,CVE-2020-28035,CVE-2020-28036,CVE-2020-28037,CVE-2020-28038,CVE-2020-28040 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|