Wordpress

Wordpress

363 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 91.81%
  • Veröffentlicht 03.05.2024 06:15:14
  • Zuletzt bearbeitet 05.01.2026 15:35:42

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with c...

  • EPSS 0.86%
  • Veröffentlicht 05.04.2024 13:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:17

WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_querya...

  • EPSS 0.94%
  • Veröffentlicht 04.04.2024 23:15:16
  • Zuletzt bearbeitet 07.01.2026 20:13:40

WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credential...

  • EPSS 39.71%
  • Veröffentlicht 04.04.2024 23:15:16
  • Zuletzt bearbeitet 02.01.2026 20:12:03

WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions pri...

Exploit
  • EPSS 53.02%
  • Veröffentlicht 16.10.2023 20:15:18
  • Zuletzt bearbeitet 23.04.2025 17:16:50

WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack

Exploit
  • EPSS 0.9%
  • Veröffentlicht 13.10.2023 12:15:09
  • Zuletzt bearbeitet 21.11.2024 08:16:12

Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 th...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 13.10.2023 10:15:09
  • Zuletzt bearbeitet 21.11.2024 08:12:40

Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.

  • EPSS 79.45%
  • Veröffentlicht 17.05.2023 09:15:10
  • Zuletzt bearbeitet 24.04.2025 19:15:45

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload...

  • EPSS 8.42%
  • Veröffentlicht 05.01.2023 02:15:07
  • Zuletzt bearbeitet 07.04.2025 19:15:49

WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a t...

Exploit
  • EPSS 91.15%
  • Veröffentlicht 14.12.2022 09:15:09
  • Zuletzt bearbeitet 21.04.2025 15:15:51

WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.