7.5
CVE-2017-1001000
- EPSS 80.37%
- Veröffentlicht 03.04.2017 01:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle 46fe6300-5254-4a98-9594-a9567b
- CVE-Watchlists
- Unerledigt
WordPress Core < 4.7.2 - Arbitrary Page Modification
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
Mögliche Gegenmaßnahme
WordPress: Update to one of the following versions, or a newer patched version: 3.7.18, 3.8.18, 3.9.16, 4.0.15, 4.1.15, 4.2.12, 4.3.8, 4.4.7, 4.5.6, 4.6.3, 4.7.2
Weitere Schwachstelleninformationen
SystemWordPress Core
≫
Produkt
WordPress
Version
[*, 3.7)
Version
3.7 - 3.7.17
Version
3.8 - 3.8.17
Version
3.9 - 3.9.15
Version
4.0 - 4.0.14
Version
4.1 - 4.1.14
Version
4.2 - 4.2.11
Version
4.3 - 4.3.7
Version
4.4 - 4.4.6
Version
4.5 - 4.5.5
Version
4.6 - 4.6.2
Version
4.7 - 4.7.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 80.37% | 0.991 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|