#VU5612 Security bypass in WordPress - CVE-2017-1001000

 

#VU5612 Security bypass in WordPress - CVE-2017-1001000

Published: February 7, 2017 / Updated: October 18, 2018


Vulnerability identifier: #VU5612
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2017-1001000
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
WordPress
Software vendor:
WordPress.ORG

Description

The vulnerability allows a remote attacker to inject arbitrary content.

The vulnerability exists due to web application fails to check privileges when processing requests sent via REST API in /wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php script. A remote attacker can send a specially crafted HTTP request to /wp-json/wp/v2/posts/{POST_ID} URL and post arbitrary content to your website.

Successful exploitation of the vulnerability may allow an attacker to perform phishing and drive-by-download attacks, spread spam content, etc. In certain cases this vulnerability can lead to remote PHP code execution leveraging functionality of third-party plugins.

Note: this vulnerability is being actively exploited in the wild.


Remediation

Update to version 4.7.2.

External links