Directory traversal in upgrade package uploader in WordPress - CVE-2016-7169
Published: September 7, 2016 / Updated: October 18, 2018
WordPress
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient sanitization of input data within the upgrade package uploader. A remote authenticated user can use directory traversal sequences to write files outside the webroot directory.
Successful exploitation of this vulnerability may lead to website compromise.
How to mitigate CVE-2016-7169
3.7.x - 3.7.16
3.8.x - 3.8.16
3.9.x - 3.9.14
4.0.x - 4.0.13
4.1.x - 4.1.13
4.2.x - 4.2.10
4.3.x - 4.3.6
4.4.x - 4.4.5
4.5.x - 4.5.4
4.6.x - 4.6.1
Sources
- https://codex.wordpress.org/Version_3.7.16
- https://codex.wordpress.org/Version_3.8.16
- https://codex.wordpress.org/Version_3.9.14
- https://codex.wordpress.org/Version_4.0.13
- https://codex.wordpress.org/Version_4.1.13
- https://codex.wordpress.org/Version_4.2.10
- https://codex.wordpress.org/Version_4.3.6
- https://codex.wordpress.org/Version_4.4.5
- https://codex.wordpress.org/Version_4.5.4
- https://codex.wordpress.org/Version_4.6.1