SB2023101623 - Multiple vulnerabilities in WordPress



SB2023101623 - Multiple vulnerabilities in WordPress

Published: October 16, 2023 Updated: May 13, 2024

Security Bulletin ID SB2023101623
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 13% Medium 50% Low 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Deserialization of Untrusted Data (CVE-ID: N/A)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Code Injection (CVE-ID: N/A)

The vulnerability allows a remote user to execute arbitrary shortcodes.

The vulnerability exists due to improper input validation. A remote user can bypass implemented security restrictions and execute arbitrary shortcodes on the website.


3) Cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via success_url and reject_url parameters in the application password screen. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


4) Stored cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the footnotes block. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Improper access control (CVE-ID: CVE-2023-39999)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and read comments on private and password protected posts.


6) Stored cross-site scripting (CVE-ID: CVE-2023-38000)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the post link navigation block. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.


7) Information disclosure (CVE-ID: CVE-2023-5561)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the "/wp-json/wp/v2/users" REST API endpoin. A remote attacker can disclose email addresses of WordPress users by probing them character by character.


8) Input validation error (CVE-ID: N/A)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing the X-HTTP-Method-Override header. A remote attacker can send specially crafted requests to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.