#VU368 Cross-site scripting in /wp-admin/includes/media.php script in WordPress - CVE-2016-7168
Published: September 7, 2016 / Updated: January 10, 2017
Vulnerability identifier: #VU368
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-7168
CWE-ID: CWE-79
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
WordPress
WordPress
Software vendor:
WordPress.ORG
WordPress.ORG
Description
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability is caused by incorrect filtration of input data passed via image filename in /wp-admin/includes/media.php script. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in website administrator’s browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Update your WordPress installation to one of the following versions:
3.7.x - 3.7.16
3.8.x - 3.8.16
3.9.x - 3.9.14
4.0.x - 4.0.13
4.1.x - 4.1.13
4.2.x - 4.2.10
4.3.x - 4.3.6
4.4.x - 4.4.5
4.5.x - 4.5.4
4.6.x - 4.6.1
3.7.x - 3.7.16
3.8.x - 3.8.16
3.9.x - 3.9.14
4.0.x - 4.0.13
4.1.x - 4.1.13
4.2.x - 4.2.10
4.3.x - 4.3.6
4.4.x - 4.4.5
4.5.x - 4.5.4
4.6.x - 4.6.1
External links
- https://codex.wordpress.org/Version_3.7.16
- https://codex.wordpress.org/Version_3.8.16
- https://codex.wordpress.org/Version_3.9.14
- https://codex.wordpress.org/Version_4.0.13
- https://codex.wordpress.org/Version_4.1.13
- https://codex.wordpress.org/Version_4.2.10
- https://codex.wordpress.org/Version_4.3.6
- https://codex.wordpress.org/Version_4.4.5
- https://codex.wordpress.org/Version_4.5.4
- https://codex.wordpress.org/Version_4.6.1