Wordpress

Wordpress

360 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.4%
  • Published 23.09.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

Before version 4.8.2, WordPress was susceptible to an open redirect attack in wp-admin/edit-tag-form.php and wp-admin/user-edit.php.

  • EPSS 4.61%
  • Published 23.09.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor.

  • EPSS 3.31%
  • Published 18.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability exists when attempting to upload very large files, because the error message does not properly restrict presentation of the filename.

  • EPSS 1.67%
  • Published 18.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In WordPress before 4.7.5, there is improper handling of post meta data values in the XML-RPC API.

  • EPSS 1.45%
  • Published 18.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability related to the Customizer exists, involving an invalid customization session.

  • EPSS 1.26%
  • Published 18.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In WordPress before 4.7.5, a Cross Site Request Forgery (CSRF) vulnerability exists in the filesystem credentials dialog because a nonce is not required for updating credentials.

  • EPSS 3.55%
  • Published 18.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In WordPress before 4.7.5, there is a lack of capability checks for post meta data in the XML-RPC API.

  • EPSS 1.41%
  • Published 18.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.

Exploit
  • EPSS 68.94%
  • Published 04.05.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for th...

  • EPSS 80.37%
  • Published 03.04.2017 01:59:00
  • Last modified 20.04.2025 01:37:25

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a re...