VID |
22990 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its self-reported version number, the installation of WordPress installed on the remote host is affected by multiple vulnerabilities:
- A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled. (CVE-2021-29447)
- One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. (CVE-2021-29450)
* References: https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pmmh-2f36-wvhq https://lists.debian.org/debian-lts-announce/2021/04/msg00017.html https://wordpress.org/news/category/security/ Vendor Advisory https://www.debian.org/security/2021/dsa-4896 http://packetstormsecurity.com/files/163148/XML-External-Entity-Via-MP3-File-Upload-On-WordPress.html http://packetstormsecurity.com/files/164198/WordPress-5.7-Media-Library-XML-Injection.html https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-rv47-pc52-qrhh https://lists.debian.org/debian-lts-announce/2021/04/msg00017.html https://wordpress.org/news/category/security/ https://www.debian.org/security/2021/dsa-4896
* Platforms Affected: WordPress prior to 5.7.0 Any operating system Any version |
Recommendation |
Upgrade to the version (5.7.0 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/ |
Related URL |
CVE-2021-29447,CVE-2021-29450 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|