|Category:||Web application abuses|
|Title:||WordPress Multiple Vulnerabilities (Security Release) - December 2018 (Windows)|
|Summary:||This host is running WordPress and is prone; to multiple vulnerabilities.|
This host is running WordPress and is prone
to multiple vulnerabilities.
The following vulnerabilities exist:
- Authors could alter meta data to delete files that they weren't authorized to.
- Authors could create posts of unauthorized post types with specially crafted input.
- Contributors could craft meta data in a way that resulted in PHP object injection.
- Contributors could edit new comments from higher-privileged users, potentially leading to a cross-site scripting vulnerability.
- Specially crafted URL inputs could lead to a cross-site scripting vulnerability in some circumstances.
WordPress itself was not affected, but plugins could be in some situations.
- The user activation screen could be indexed by search engines in some uncommon configurations,
leading to exposure of email addresses, and in some rare cases, default generated passwords.
- Authors on Apache-hosted sites could upload specifically crafted files that bypass MIME verification,
leading to a cross-site scripting vulnerability.
All versions since WordPress 3.7 up to 5.0.
The issues have been fixed in version 5.0.1.
Updated versions of WordPress 4.9 and older releases are also available.
For details refer to the referenced links to apply the correct fix for your specific version.
BugTraq ID: 106220|
Common Vulnerability Exposure (CVE) ID: CVE-2018-20147
Common Vulnerability Exposure (CVE) ID: CVE-2018-20148
Common Vulnerability Exposure (CVE) ID: CVE-2018-20149
Common Vulnerability Exposure (CVE) ID: CVE-2018-20150
Common Vulnerability Exposure (CVE) ID: CVE-2018-20151
Common Vulnerability Exposure (CVE) ID: CVE-2018-20152
Common Vulnerability Exposure (CVE) ID: CVE-2018-20153
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.