Wordpress

Wordpress

361 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.05%
  • Veröffentlicht 11.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:30:17

WordPress before 5.2.3 allows XSS in media uploads because wp_ajax_upload_attachment is mishandled.

  • EPSS 2.45%
  • Veröffentlicht 11.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:30:17

WordPress before 5.2.3 allows XSS in stored comments.

  • EPSS 4.69%
  • Veröffentlicht 11.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:30:18

WordPress before 5.2.3 allows XSS in shortcode previews.

  • EPSS 0.82%
  • Veröffentlicht 11.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:30:18

In WordPress before 5.2.3, validation and sanitization of a URL in wp_validate_redirect in wp-includes/pluggable.php could lead to an open redirect if a provided URL path does not start with a forward slash.

  • EPSS 1.46%
  • Veröffentlicht 22.05.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:29:56

WordPress 4.7.2 mishandles listings of post authors, which allows remote attackers to obtain sensitive information (Path Disclosure) via a /wp-json/oembed/1.0/embed?url= request, related to the "author_name":" substring.

Exploit
  • EPSS 87%
  • Veröffentlicht 14.03.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:18

WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elem...

Exploit
  • EPSS 92.7%
  • Veröffentlicht 20.02.2019 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:50:42

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can exe...

Exploit
  • EPSS 93.84%
  • Veröffentlicht 20.02.2019 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:50:42

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filen...

Medienbericht
  • EPSS 5.79%
  • Veröffentlicht 14.12.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:56

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

Medienbericht Exploit
  • EPSS 54.86%
  • Veröffentlicht 14.12.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:56

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_t...