icon

We found results for “

WS-2018-0169

Good to know:

icon

Date: January 26, 2018

Any WordPress version, including the current 4.9.6 version, is susceptible to the vulnerability.For exploiting the vulnerability discussed in the following an attacker would need to gain the privileges to edit and delete media files beforehand. Thus, the vulnerability can be used to escalate privileges attained through the takeover of an account with a role as low as Author, or through the exploitation of another vulnerability/misconfiguration.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Configuration

CWE-16

Top Fix

icon

Upgrade Version

Upgrade to version 4.9.7

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

Do you need more information?

Contact Us