Korean
<< Back
VID 22958
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its self-reported version number, the installation of WordPress installed on the remote host is affected by multiple vulnerabilities:

- A deserialization vulnerability exists in wp-includes/Requests/Utility/FilteredIterator.php. An unauthenticated, remote attacker can exploit this, by sending specially crafted serialized payloads to an affected instance, to execute arbitrary code on the target host (CVE-2020-28032).

- Multiple privilege escalation vulnerabilities exist in the XML-RPC component of Wordpress. An unauthenticated, remote attacker can exploit these, to gain privileged access to an affected host (CVE-2020-28035, CVE-2020-28036).

- A remote code execution vulnerability exists in the is_blog_installed function of wp-includes/functions.php. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands (CVE-2020-28037)

* References:
https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
https://wordpress.org/support/wordpress-version/version-5-5-2/

* Platforms Affected:
WordPress prior to 5.5.2
Any operating system Any version
Recommendation Upgrade to the version (5.5.2 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/
Related URL CVE-2020-28032,CVE-2020-28033,CVE-2020-28034,CVE-2020-28035,CVE-2020-28036,CVE-2020-28037,CVE-2020-28038,CVE-2020-28040 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)