Latest Wordpress Wordpress 4 6 8 Security Vulnerabilities
|2017-03-12||CVE-2017-6817|| Cross-Site Scripting vulnerability in Wordpress |
In WordPress before 4.7.3 (wp-includes/embed.php), there is authenticated Cross-Site Scripting (XSS) in YouTube URL Embeds.
|2017-03-12||CVE-2017-6816|| Incorrect Authorization vulnerability in Wordpress |
In WordPress before 4.7.3 (wp-admin/plugins.php), unintended files can be deleted by administrators using the plugin deletion functionality.
|2017-03-12||CVE-2017-6815|| Improper Input Validation vulnerability in Wordpress |
In WordPress before 4.7.3 (wp-includes/pluggable.php), control characters can trick redirect URL validation.
|2017-03-12||CVE-2017-6814|| Cross-Site Scripting vulnerability in Wordpress |
In WordPress before 4.7.3, there is authenticated Cross-Site Scripting (XSS) via Media File Metadata.
|2017-01-30||CVE-2017-5612|| Cross-Site Scripting vulnerability in Wordpress |
Cross-site scripting (XSS) vulnerability in wp-admin/includes/class-wp-posts-list-table.php in the posts list table in WordPress before 4.7.2 allows remote attackers to inject arbitrary web script or HTML via a crafted excerpt.
|2017-01-30||CVE-2017-5611|| SQL Injection vulnerability in Wordpress |
SQL injection vulnerability in wp-includes/class-wp-query.php in WP_Query in WordPress before 4.7.2 allows remote attackers to execute arbitrary SQL commands by leveraging the presence of an affected plugin or theme that mishandles a crafted post type name.
|2017-01-30||CVE-2017-5610|| Information Exposure vulnerability in Wordpress |
wp-admin/includes/class-wp-press-this.php in Press This in WordPress before 4.7.2 does not properly restrict visibility of a taxonomy-assignment user interface, which allows remote attackers to bypass intended access restrictions by reading terms.
|2017-01-15||CVE-2017-5493|| USE of Cryptographically Weak Pseudo-Random Number Generator (Prng) vulnerability in Wordpress |
wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or (2) user signup.
|2017-01-15||CVE-2017-5492|| Cross-Site Request Forgery (CSRF) vulnerability in Wordpress |
Cross-site request forgery (CSRF) vulnerability in the widget-editing accessibility-mode feature in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims for requests that perform a widgets-access action, related to wp-admin/includes/class-wp-screen.php and wp-admin/widgets.php.
|2017-01-15||CVE-2017-5491|| Insecure Default Initialization of Resource vulnerability in Wordpress |
wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.