Search for packages
| purl | pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie |
| Next non-vulnerable version | 5.7.14+dfsg1-0+deb11u1 |
| Latest non-vulnerable version | 6.9.4+dfsg1-1 |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-gyaq-8pvh-p7gg
Aliases: CVE-2012-6707 |
WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-jghn-eujf-zbdn
Aliases: CVE-2023-5692 |
WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-yqam-kpce-dfg7
Aliases: CVE-2021-44223 |
WordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-12nz-jt4k-afdm | security update |
CVE-2016-4029
|
| VCID-14w4-eqhq-zuhu | A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts. This may allow a user with 'Contributor-level' privileges to post as if they had 'publish_posts' permission. |
CVE-2011-1762
|
| VCID-198e-9yps-nqfz | security update |
CVE-2017-5491
|
| VCID-1axp-38yu-wua1 | security update |
CVE-2017-5489
|
| VCID-1by8-54pr-ubcw | In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34). |
CVE-2020-4046
|
| VCID-1cad-s6nn-j7aw | embedded prototype.js JavaScript hijacking |
CVE-2007-2383
|
| VCID-1cp7-76kz-47ed | Cross-site scripting (XSS) vulnerability in functions.php in the default theme in WordPress 2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the PATH_INFO (REQUEST_URI) to wp-admin/themes.php, a different vulnerability than CVE-2007-1622. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability. |
CVE-2007-3238
|
| VCID-1hu7-2yjp-m7b8 | Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Various security hardening." |
CVE-2011-3125
|
| VCID-1j31-f88g-kfe7 | security update |
CVE-2021-29450
|
| VCID-1tvf-ywk8-5yh5 | wp-admin/user-edit.php in WordPress before 2.0.5 allows remote authenticated users to read the metadata of an arbitrary user via a modified user_id parameter. |
CVE-2006-6016
|
| VCID-1tw6-axgs-f3hy | security update |
CVE-2020-11027
|
| VCID-1z8j-st48-qkgn | security update |
CVE-2017-14718
|
| VCID-251h-7yfd-sbdy | security update |
CVE-2016-5835
|
| VCID-27hh-rxke-cfan | wp-admin/plugins.php in WordPress before 3.3.2 allows remote authenticated site administrators to bypass intended access restrictions and deactivate network-wide plugins via unspecified vectors. |
CVE-2012-2402
|
| VCID-2amm-jjpz-xyhf | wordpress: multiple XSS issues in invite action |
CVE-2008-1304
|
| VCID-2b99-baqh-3ker | Cross-site request forgery (CSRF) vulnerability in the customizer in WordPress before 3.4.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. |
CVE-2012-3384
|
| VCID-2gqt-ngbw-xyby | security update |
CVE-2022-21664
|
| VCID-2h1g-qy4e-rkhb | Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Media security." |
CVE-2011-3122
|
| VCID-2hh2-akug-byew | security update |
CVE-2014-9039
|
| VCID-2jgs-b7r7-zygv | In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). |
CVE-2020-11030
|
| VCID-2jta-dshu-e7hb | WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8. |
CVE-2021-39202
|
| VCID-2qnz-21s3-tbgm | Wordpress contains several cross-site scripting, cross-site request forgery and information leak vulnerabilities. |
CVE-2007-1049
|
| VCID-2rqp-572a-ufcr | security update |
CVE-2015-3440
|
| VCID-2s1y-35gq-vyh5 | several |
CVE-2013-2200
|
| VCID-2y62-terv-2qfc | Multiple vulnerabilities have been found in Nagios, the worst of which could lead to privilege escalation. |
CVE-2008-4796
|
| VCID-3131-uvkj-vbb5 | wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins. |
CVE-2008-5695
|
| VCID-3171-8hu9-4uev | security update |
CVE-2019-17675
|
| VCID-32qc-zmsg-gfa4 | security update |
CVE-2015-5730
|
| VCID-3572-tc84-pyhv | security update |
CVE-2023-2745
|
| VCID-3cqk-swz6-dqez | WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1. |
CVE-2005-2110
|
| VCID-3e65-zd17-rqhy | Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters." |
CVE-2007-4894
|
| VCID-3f5q-3k4x-aue9 | The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI. |
CVE-2017-1001000
|
| VCID-3m3b-wxjf-qfg4 | Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters. |
CVE-2008-4671
|
| VCID-3veg-k8v2-tyhr | security update |
CVE-2019-17671
|
| VCID-46dk-a282-8bf9 | security update |
CVE-2017-5612
|
| VCID-47fm-x1rg-vbct | security update |
CVE-2024-31210
|
| VCID-47he-853j-8qdn | WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been patched in WordPress 5.8.1, along with any older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix. |
CVE-2021-39200
|
| VCID-4cs6-n1vc-13cd | wordpress: multiple vulnerabilities |
CVE-2009-2336
|
| VCID-4eng-dut7-nqhw | WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix. |
CVE-2007-0262
|
| VCID-4f6a-j9gu-k7f8 | Unspecified vulnerability in akismet.php in Matt Mullenweg Akismet before 2.0.2, a WordPress plugin, has unknown impact and attack vectors. |
CVE-2007-2714
|
| VCID-4g2n-5v12-yuff | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic WordPress allows Stored XSS.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9. |
CVE-2024-31111
|
| VCID-4gpe-jspv-n7c7 | Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1. |
CVE-2008-0194
|
| VCID-4h3z-2ypq-tyf1 | Directory traversal vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to read or include arbitrary files via a trailing null byte (%00) in the (1) theme, (2) language, (3) plugins, or (4) lang parameter. |
CVE-2005-4600
|
| VCID-4h9a-f492-cqgx | wp-admin/plugins.php in WordPress before 3.4.2, when the multisite feature is enabled, does not check for network-administrator privileges before performing a network-wide activation of an installed plugin, which might allow remote authenticated users to make unintended plugin changes by leveraging the Administrator role. |
CVE-2012-4422
|
| VCID-4p1q-h56b-1qhj | security update |
CVE-2015-3438
|
| VCID-4sv3-qgzg-eyhn | SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable. |
CVE-2007-1897
|
| VCID-4ty5-fp9a-8qhg | security update |
CVE-2019-16781
|
| VCID-532z-9qbb-dyfw | Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30. |
CVE-2025-58246
|
| VCID-5698-c229-bqc9 | WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs. |
CVE-2019-17670
|
| VCID-56a2-3fcw-bkfg | A flaw in WordPress allows registered WordPress users to elevate privileges. |
CVE-2006-3389
|
| VCID-5brn-syjs-d3dp | Moodle vulnerable to Cross-site Scripting Cross-site scripting (XSS) vulnerability in the fix_non_standard_entities function in the KSES HTML text cleaning library (weblib.php), as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via crafted HTML entities. |
CVE-2010-1619
GHSA-hhxf-w8hj-43w6 |
| VCID-5d4e-5ngu-mfgy | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The KSES text cleaning filter in lib/weblib.php in Moodle before 1.8.13 and 1.9.x before 1.9.9 does not properly handle vbscript URIs, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input. |
CVE-2010-2230
GHSA-3gm8-32vv-q8mp |
| VCID-5pv4-ff9z-r3hp | WordPress is vulnerable to SQL injection, information disclosure, and cross-site scripting attacks. |
CVE-2006-6808
|
| VCID-5q3r-v8z7-x3f8 | The XML-RPC remote publishing interface in xmlrpc.php in WordPress before 3.0.3 does not properly check capabilities, which allows remote authenticated users to bypass intended access restrictions, and publish, edit, or delete posts, by leveraging the Author or Contributor role. |
CVE-2010-5106
|
| VCID-5v95-fhhm-33an | WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter. |
CVE-2010-0682
|
| VCID-624m-hj1c-r3hq | Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the popuptitle parameter to (1) wp-admin/post.php or (2) wp-admin/page-new.php. |
CVE-2008-0192
|
| VCID-67jm-6jkk-1yaw | Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message. |
CVE-2005-1688
|
| VCID-6baf-6r3v-gub4 | Wordpress contains several cross-site scripting, cross-site request forgery and information leak vulnerabilities. |
CVE-2007-1409
|
| VCID-6cda-2819-puhp | security update |
CVE-2016-7168
|
| VCID-6d1g-aj3f-3kav | Multiple cross-site scripting (XSS) vulnerabilities in the request_filesystem_credentials function in wp-admin/includes/file.php in WordPress before 3.0.2 allow remote servers to inject arbitrary web script or HTML by providing a crafted error message for a (1) FTP or (2) SSH connection attempt. |
CVE-2010-5294
|
| VCID-6ejh-nyh8-gqar | security update |
CVE-2018-10100
|
| VCID-6j54-w242-hfce | security update |
CVE-2022-43504
|
| VCID-6jxp-68cd-37db | Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFupload 2.2.0.1 and earlier, as used in WordPress before 3.5.2, TinyMCE Image Manager 1.1 and earlier, and other products allows remote attackers to inject arbitrary web script or HTML via the buttonText parameter, a different vulnerability than CVE-2012-3414. |
CVE-2012-2399
|
| VCID-6mkb-a89m-zfgs | several |
CVE-2013-4339
|
| VCID-6npq-by6g-cqg8 | WordPress before 2.2.2 allows remote attackers to redirect visitors to other websites and potentially obtain sensitive information via (1) the _wp_http_referer parameter to wp-pass.php, related to the wp_get_referer function in wp-includes/functions.php; and possibly other vectors related to (2) wp-includes/pluggable.php and (3) the wp_nonce_ays function in wp-includes/functions.php. |
CVE-2007-3639
|
| VCID-6rsq-xshv-bucw | Wordpress contains SQL injection and XSS vulnerabilities. |
CVE-2005-1687
|
| VCID-6tqn-qmx9-f3dc | wordpress delayed attack via cookies |
CVE-2008-5113
|
| VCID-6vg6-xewr-ryfv | Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie. |
CVE-2005-2612
|
| VCID-6xna-bhaz-bbcm | WordPress 2.0.2 through 2.0.5 allows remote attackers to obtain sensitive information via a direct request for (1) 404.php, (2) akismet.php, (3) archive.php, (4) archives.php, (5) attachment.php, (6) blogger.php, (7) comments.php, (8) comments-popup.php, (9) dotclear.php, (10) footer.php, (11) functions.php, (12) header.php, (13) hello.php, (14) wp-content/themes/default/index.php, (15) links.php, (16) livejournal.php, (17) mt.php, (18) page.php, (19) rss.php, (20) searchform.php, (21) search.php, (22) sidebar.php, (23) single.php, (24) textpattern.php, (25) upgrade-functions.php, (26) upgrade-schema.php, or (27) wp-db-backup.php, which reveal the path in various error messages. NOTE: another researcher has disputed the details of this report, stating that version 2.0.5 does not exist. NOTE: the admin-footer.php, admin-functions.php, default-filters.php, edit-form-advanced.php, edit-link-form.php, edit-page-form.php, kses.php, locale.php, rss-functions.php, template-loader.php, and wp-db.php vectors are already covered by CVE-2006-0986. The edit-form-comment.php, vars.php, and wp-settings.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. |
CVE-2006-4743
|
| VCID-722f-e2hf-xyc9 | security update |
CVE-2023-5561
|
| VCID-7643-6738-v3g9 | Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter. |
CVE-2007-5710
|
| VCID-767p-btpd-tudb | security update |
CVE-2019-17669
|
| VCID-7dmm-cvtk-aydj | wp-admin/admin-functions.php in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a does not properly verify the unfiltered_html privilege, which allows remote attackers to conduct cross-site scripting (XSS) attacks via modified data to (1) post.php or (2) page.php with a no_filter field. |
CVE-2007-4893
|
| VCID-7fgf-juyy-fufk | Cross-site scripting (XSS) vulnerability in the CSRF protection scheme in WordPress before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via a CSRF attack with an invalid token and quote characters or HTML tags in URL variable names, which are not properly handled when WordPress generates a new link to verify the request. |
CVE-2007-0106
|
| VCID-7gbk-16zv-j7f9 | WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach. |
CVE-2014-6412
|
| VCID-7hgx-yyw8-23cj | The oEmbed protocol implementation in WordPress before 4.5.3 allows remote attackers to cause a denial of service via unspecified vectors. |
CVE-2016-5836
|
| VCID-7hh4-ex15-9uh9 | WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 does not prevent rendering for (1) admin or (2) login pages inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. |
CVE-2011-3127
|
| VCID-7kjc-hwqu-wufc | wp-login.php in WordPress allows remote attackers to redirect authenticated users to other websites and potentially obtain sensitive information via the redirect_to parameter. |
CVE-2007-1599
|
| VCID-7qy9-e4j5-6fdb | wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress. |
CVE-2007-0233
|
| VCID-7twj-axjh-rudj | security update |
CVE-2017-17094
|
| VCID-7wx9-apzc-qqar | wordpress: multiple vulnerabilities |
CVE-2009-2334
|
| VCID-82ky-v2zx-53h4 | WordPress before 2.0.5 does not properly store a profile containing a string representation of a serialized object, which allows remote authenticated users to cause a denial of service (application crash) via a string that represents a (1) malformed or (2) large serialized object, because the object triggers automatic unserialization for display. |
CVE-2006-6017
|
| VCID-8hdt-8gc7-4kgg | wp-admin/media-upload.php in WordPress before 3.3.3 allows remote attackers to obtain sensitive information or bypass intended media-attachment restrictions via a post_id value. |
CVE-2012-6634
|
| VCID-8kvg-dxb5-7uhx | security update |
CVE-2015-3439
|
| VCID-8mat-2mjd-7fgm | WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php. |
CVE-2019-9787
|
| VCID-8ms9-r5pz-fkc3 | security update |
CVE-2014-5265
|
| VCID-8n5j-65xk-wqbp | Wordpress before 2.8.3 does not check capabilities for certain actions, which allows remote attackers to make unauthorized edits or additions via a direct request to (1) edit-comments.php, (2) edit-pages.php, (3) edit.php, (4) edit-category-form.php, (5) edit-link-category-form.php, (6) edit-tag-form.php, (7) export.php, (8) import.php, or (9) link-add.php in wp-admin/. |
CVE-2009-2854
|
| VCID-8rfd-k93s-qycc | Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery. |
CVE-2017-14724
|
| VCID-8sa8-xkg1-ybbm | Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the Options Database Table in the Admin Panel, accessed through options.php; or (2) the opml_url parameter to link-import.php. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability. |
CVE-2007-4153
|
| VCID-9166-twpv-u3a9 | security update |
CVE-2018-20150
|
| VCID-91ay-j618-akgj | SQL injection vulnerability in xmlrpc.php in WordPress 2.2 allows remote authenticated users to execute arbitrary SQL commands via a parameter value in an XML RPC wp.suggestCategories methodCall, a different vector than CVE-2007-1897. |
CVE-2007-3140
|
| VCID-92fa-nrxb-e3gj | security update |
CVE-2020-28032
|
| VCID-95zd-g97m-ekh3 | getID3 is vulnerable to XML External Entity (XXE) getID3() before 1.9.9, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. |
CVE-2014-2053
GHSA-5v43-55m5-qr8f |
| VCID-96pa-cg28-cbgy | Cross-site scripting (XSS) vulnerability in WordPress before 2.6, SVN development versions only, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2008-3233
|
| VCID-98e3-ffna-jfbs | security update |
CVE-2019-17674
|
| VCID-9dcr-4f3a-myfs | wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action. |
CVE-2010-5296
|
| VCID-9t3e-tq9t-7qay | WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects. |
CVE-2011-3126
|
| VCID-9zbn-b1sp-buan | WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 treats unattached attachments as published, which might allow remote attackers to obtain sensitive data via vectors related to wp-includes/post.php. |
CVE-2011-3128
|
| VCID-aesj-sy6k-57de | Cross-site scripting (XSS) vulnerability in the column_title function in wp-admin/includes/class-wp-media-list-table.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5834. |
CVE-2016-5833
|
| VCID-agpu-husf-6be4 | security update |
CVE-2019-16217
|
| VCID-ajbz-j6qz-vua9 | Wordpress before 2.8.3 allows remote attackers to gain privileges via a direct request to (1) admin-footer.php, (2) edit-category-form.php, (3) edit-form-advanced.php, (4) edit-form-comment.php, (5) edit-link-category-form.php, (6) edit-link-form.php, (7) edit-page-form.php, and (8) edit-tag-form.php in wp-admin/. |
CVE-2009-2853
|
| VCID-ajrt-bhrw-k7an | security update |
CVE-2019-16220
|
| VCID-aqrt-q5ck-p3gz | Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php. |
CVE-2008-0196
|
| VCID-ar2m-eryr-hba4 | WordPress before 1.5.2 allows remote attackers to obtain sensitive information via a direct request to (1) wp-includes/vars.php, (2) wp-content/plugins/hello.php, (3) wp-admin/upgrade-functions.php, (4) wp-admin/edit-form.php, (5) wp-settings.php, and (6) wp-admin/edit-form-comment.php, which leaks the path in an error message related to undefined functions or failed includes. NOTE: the wp-admin/menu-header.php vector is already covered by CVE-2005-2110. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors were also reported to affect WordPress 2.0.1. |
CVE-2005-4463
|
| VCID-aup2-49ee-jkdf | security update |
CVE-2019-16222
|
| VCID-azsx-2ydf-zyag | security update |
CVE-2020-4050
|
| VCID-azyj-28v6-ufhg | security update |
CVE-2021-39201
|
| VCID-b4h4-1gys-uqcc | wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request. |
CVE-2008-6767
|
| VCID-b8ex-3tnw-yuh8 | security update |
CVE-2018-10102
|
| VCID-ba3v-4d8e-mfgx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols. |
CVE-2008-1502
GHSA-v759-3wr5-p294 |
| VCID-bb3n-jh6p-vfhm | security update |
CVE-2022-21661
|
| VCID-bj42-unmz-w3ht | Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field. |
CVE-2012-6633
|
| VCID-bjrn-fyux-wyh3 | wp-login.php in WordPress 1.5.1.2 and earlier allows remote attackers to change the content of the forgotten password e-mail message via the message variable, which is not initialized before use. |
CVE-2005-2109
|
| VCID-bubm-v7mg-xkcg | WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release. |
CVE-2021-39203
|
| VCID-buuf-pyc5-ybcg | wp-includes/class-wp-customize-widgets.php in the widget implementation in WordPress 3.9.x before 3.9.2 might allow remote attackers to execute arbitrary code via crafted serialized data. |
CVE-2014-5203
|
| VCID-c2ta-7w7f-kbed | security update |
CVE-2019-16218
|
| VCID-c62s-z1vc-nubq | security update |
CVE-2017-14720
|
| VCID-c7ej-2svr-uyd3 | WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar. |
CVE-2024-4439
|
| VCID-c9m4-z6x3-8ubj | security update |
CVE-2015-8834
|
| VCID-cce4-nh1p-f3gn | security update |
CVE-2019-8942
|
| VCID-cdew-g3ut-vucc | wordpress: insufficient SSL communication enforcement |
CVE-2008-3747
|
| VCID-cdj6-mgne-bkcs | security update |
CVE-2016-6634
|
| VCID-cg91-ww8b-jfep | several |
CVE-2013-5738
|
| VCID-cjc2-1tw5-u7aj | wordpress: security fixes in upstream version 2.5.1 (CVE-2008-1930, CVE-2008-2068) |
CVE-2008-2068
|
| VCID-cnz9-cwwa-23d1 | Multiple cross-site scripting (XSS) vulnerabilities in post.php in WordPress 1.5.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) p or (2) comment parameter. |
CVE-2005-2107
|
| VCID-cut3-n4rz-jqf7 | SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components. |
CVE-2007-4154
|
| VCID-cuw7-7fmc-xbc1 | security update |
CVE-2017-5488
|
| VCID-cwud-1n3k-rfcs | security update |
CVE-2017-17092
|
| VCID-d4b9-ek6d-nbb3 | The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013. |
CVE-2008-1930
|
| VCID-d6e4-71uw-xyeb | The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896. |
CVE-2016-10148
|
| VCID-dfrf-wx3v-rfbg | Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php. |
CVE-2007-3543
|
| VCID-dg97-fkvm-rqh2 | SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field. |
CVE-2010-4257
|
| VCID-dkht-9n6n-fucn | security update |
CVE-2017-14725
|
| VCID-dv3a-7kct-xqh6 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic WordPress allows Relative Path Traversal.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9, from 5.8 through 5.8.9, from 5.7 through 5.7.11, from 5.6 through 5.6.13, from 5.5 through 5.5.14, from 5.4 through 5.4.15, from 5.3 through 5.3.17, from 5.2 through 5.2.20, from 5.1 through 5.1.18, from 5.0 through 5.0.21, from 4.9 through 4.9.25, from 4.8 through 4.8.24, from 4.7 through 4.7.28, from 4.6 through 4.6.28, from 4.5 through 4.5.31, from 4.4 through 4.4.32, from 4.3 through 4.3.33, from 4.2 through 4.2.37, from 4.1 through 4.1.40. |
CVE-2024-32111
|
| VCID-dw8d-4vse-jqbe | security update |
CVE-2015-5734
|
| VCID-dzgs-vwe3-fub1 | security update |
CVE-2019-20042
|
| VCID-e1ss-azne-d7ha | In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This. |
CVE-2017-6819
|
| VCID-e1ud-yfqb-4kca | The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature. |
CVE-2012-4421
|
| VCID-e37d-h1k6-sud6 | security update |
CVE-2017-14721
|
| VCID-e8s1-sduw-a7aa | several |
CVE-2013-2173
|
| VCID-ejtq-a5ca-ffbu | security update |
CVE-2019-16221
|
| VCID-ewvz-wnn2-57h2 | Multiple "unannounced" cross-site scripting (XSS) vulnerabilities in WordPress before 2.0.2 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors. |
CVE-2006-1263
|
| VCID-f8cq-auvz-7be1 | security update |
CVE-2016-5837
|
| VCID-fa64-2upm-rfg5 | Cross-site scripting (XSS) vulnerability in an mt import in wp-admin/admin.php in WordPress 2.1.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the demo parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: another researcher disputes this issue, stating that this is legitimate functionality for administrators. However, it has been patched by at least one vendor |
CVE-2007-1732
|
| VCID-fc6e-njgb-pued | WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment. |
CVE-2007-0541
|
| VCID-fcqu-11yk-h3af | security update |
CVE-2018-20149
|
| VCID-fd51-1hat-v3ee | security update |
CVE-2017-17091
|
| VCID-fdtx-uggj-ybby | The make_clickable function in wp-includes/formatting.php in WordPress before 3.1.1 does not properly check URLs before passing them to the PCRE library, which allows remote attackers to cause a denial of service (crash) via a comment with a crafted URL that triggers many recursive calls. |
CVE-2011-4957
|
| VCID-fkqw-vkvb-gydh | security update |
CVE-2016-5832
|
| VCID-fmzm-hb5j-dyfe | several |
CVE-2013-2203
|
| VCID-fnf4-fykj-p3f7 | WordPress 2.0.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) default-filters.php, (2) template-loader.php, (3) rss-functions.php, (4) locale.php, (5) wp-db.php, and (6) kses.php in the wp-includes/ directory; and (7) edit-form-advanced.php, (8) admin-functions.php, (9) edit-link-form.php, (10) edit-page-form.php, (11) admin-footer.php, and (12) menu.php in the wp-admin directory; and possibly (13) list directory contents of the wp-includes directory. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. Other vectors might be covered by CVE-2005-1688. NOTE: if the typical installation of WordPress does not list any site-specific files to wp-includes, then vector [13] is not an exposure. |
CVE-2006-0986
|
| VCID-fpwa-74w6-mugt | security update |
CVE-2019-16780
|
| VCID-fqna-8mh3-rkd8 | Cross-site request forgery (CSRF) vulnerability in wp-admin/index.php in WordPress 3.4.2 allows remote attackers to hijack the authentication of administrators for requests that modify an RSS URL via a dashboard_incoming_links edit action. |
CVE-2012-4448
|
| VCID-fra3-hye6-kqh7 | Insecure Deserialization of untrusted data in rmccue/requests ### Impact Unserialization of untrusted data. ### Patches The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0. ### References Publications about the vulnerability: * https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress * https://github.com/ambionics/phpggc/issues/52 * https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/ * https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf * https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf * https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf * https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f Originally fixed in WordPress 5.5.2: * https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3 * https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ Related Security Advisories: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032 * https://nvd.nist.gov/vuln/detail/CVE-2020-28032 Notification to the Requests repo including a fix in: * https://github.com/rmccue/Requests/pull/421 and * https://github.com/rmccue/Requests/pull/422 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Request](https://github.com/WordPress/Requests/) |
CVE-2021-29476
GHSA-52qp-jpq7-6c54 |
| VCID-fuma-nkmd-zkc1 | security update |
CVE-2019-17673
|
| VCID-fykj-9gba-rqgn | security update |
CVE-2014-9036
|
| VCID-fzyt-wpgd-byh1 | Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box. |
CVE-2011-0700
|
| VCID-gakg-ky9v-ayej | security update |
CVE-2016-6635
|
| VCID-gfey-nhj7-6fap | wordpress cookie authentication vulnerability |
CVE-2007-6013
|
| VCID-ggs8-1k6e-ebc8 | security update |
CVE-2015-7989
|
| VCID-ghn9-muv6-17d7 | security update |
CVE-2017-14723
|
| VCID-gwks-aqn7-mud4 | security update |
CVE-2017-9065
|
| VCID-gy54-apzn-7kef | security update |
CVE-2020-28036
|
| VCID-gz89-rnrc-2ubc | wp-includes/formatting.php in WordPress before 3.3.2 attempts to enable clickable links inside attributes, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. |
CVE-2012-2403
|
| VCID-h1fb-65br-93fb | security update |
CVE-2016-5838
|
| VCID-h2mz-4fad-9qdj | Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action. |
CVE-2010-5295
|
| VCID-h3ab-qy7a-r3ea | SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file. |
CVE-2005-2108
|
| VCID-h4xu-vw5g-x3gw | Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI']). |
CVE-2006-1796
|
| VCID-h5up-s13c-2ygg | security update |
CVE-2022-43497
|
| VCID-h644-6au9-q3c6 | WordPress is vulnerable to an SQL injection vulnerability. |
CVE-2006-1012
|
| VCID-h97y-a92u-2fay | security update |
CVE-2020-28040
|
| VCID-hamd-mn9k-q3f5 | Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information. |
CVE-2008-4769
|
| VCID-hjhs-79fd-xff1 | wp-comments-post.php in WordPress before 3.3.2 supports offsite redirects, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. |
CVE-2012-2404
|
| VCID-hkp2-z1em-x3gu | security update |
CVE-2017-16510
|
| VCID-hndb-7b4f-7bbw | security update |
CVE-2019-16223
|
| VCID-hq5p-xuuk-33f7 | WordPress through 4.8.2, when domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file. |
CVE-2016-9263
|
| VCID-hrr1-ygkz-4bhd | several |
CVE-2013-4340
|
| VCID-htec-cnsd-4ke4 | security update |
CVE-2022-21663
|
| VCID-htr5-ugyh-7yaz | security update |
CVE-2021-29447
|
| VCID-hx1m-3ehs-pudy | Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content. |
CVE-2012-2401
|
| VCID-hxky-9sa6-4udb | Cross-site scripting (XSS) vulnerability in wp-comments-post.php in WordPress 3.3.x before 3.3.1, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via the query string in a POST operation that is not properly handled by the "Duplicate comment detected" feature. |
CVE-2012-0287
|
| VCID-hyae-gf44-4qaa | several |
CVE-2013-2199
|
| VCID-j33g-aex7-uke8 | The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function. |
CVE-2005-3330
|
| VCID-j45z-kwz2-b7hn | security update |
CVE-2014-9031
|
| VCID-j4bb-d6da-w3de | Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions. |
CVE-2023-38000
|
| VCID-janm-1e9e-abb5 | WordPress before 3.4.1 does not properly restrict access to post contents such as private or draft posts, which allows remote authors or contributors to obtain sensitive information via unknown vectors. |
CVE-2012-3385
|
| VCID-jf98-kean-p3b3 | In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names. |
CVE-2017-6818
|
| VCID-jgcr-7hau-1yff | wordpress-mu: XSS vulnerability in RSS Feed Generator |
CVE-2008-5278
|
| VCID-jh7f-mzcc-f3e9 | WordPress fails to sufficiently check the format of cached username data. |
CVE-2006-2702
|
| VCID-jjjw-sspg-q3c3 | security update |
CVE-2019-20041
|
| VCID-jmhr-atwp-5kee | WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected. |
CVE-2024-31211
|
| VCID-jmx6-p5md-dycf | security update |
CVE-2014-5266
|
| VCID-jntp-tjnu-ekbk | security update |
CVE-2016-2222
|
| VCID-jr4w-6wqz-cbe3 | security update |
CVE-2014-0166
|
| VCID-juwh-zmez-dfhy | Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter. |
CVE-2013-0237
|
| VCID-k52x-fa57-hkfk | security update |
CVE-2019-16219
|
| VCID-k6a1-ag3k-y7d1 | In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF. |
CVE-2017-9066
|
| VCID-k96h-dr15-ufhv | PHPMailer Shell command injection PHPMailer before 1.7.4, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in `class.phpmailer.php`. ### Impact Shell command injection, remotely exploitable if host application does not filter user data appropriately. ### Patches Fixed in 1.7.4 ### Workarounds Filter and validate user-supplied data before putting in the into the `Sender` property. ### References https://nvd.nist.gov/vuln/detail/CVE-2007-3215 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) |
CVE-2007-3215
GHSA-6h78-85v2-mmch |
| VCID-kdb9-npxe-tyc4 | WordPress before 3.0.1, when a Multisite installation is used, permanently retains the "site administrators can add users" option once changed, which might allow remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances via an add action after a temporary change. |
CVE-2010-5297
|
| VCID-kdjp-qmxc-9qat | The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint. |
CVE-2007-0539
|
| VCID-kk83-bnn5-tuar | security update |
CVE-2020-4048
|
| VCID-kkqs-rbpz-wqhf | Cross-site scripting (XSS) vulnerability in the refreshAdvancedAccessibilityOfItem function in wp-admin/js/nav-menu.js in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via an accessibility-helper title. |
CVE-2015-5733
|
| VCID-kn9s-5v5u-d3fj | security update |
CVE-2019-20043
|
| VCID-kpem-j9we-vufs | security update |
CVE-2017-5492
|
| VCID-ksx9-t81e-pkb3 | security update |
CVE-2014-9038
|
| VCID-kybz-d1hv-g3ae | several |
CVE-2013-4338
|
| VCID-kyzb-5kb1-j7cf | security update |
CVE-2016-1564
|
| VCID-m7yz-rv7g-jbat | Flaws in WordPress allow a Denial of Service, the disclosure of user metadata and the overwriting of restricted files. |
CVE-2006-5705
|
| VCID-m8mf-t2td-67h7 | WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
CVE-2024-6307
|
| VCID-mcjm-c2c8-dkdp | Multiple cross-site scripting (XSS) vulnerabilities in the "post comment" functionality of WordPress 2.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) website, and (3) comment parameters. |
CVE-2006-0985
|
| VCID-meg6-wfw8-63cn | Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename. |
CVE-2009-3890
|
| VCID-mfvf-n63j-cfaf | security update |
CVE-2014-9034
|
| VCID-msku-2thw-jfat | several |
CVE-2013-5739
|
| VCID-mu7j-73tw-xbc6 | security update |
CVE-2015-2213
|
| VCID-mwcj-thjj-nyfd | A flaw in WordPress allows registered WordPress users to elevate privileges. |
CVE-2006-3390
|
| VCID-mxvk-932h-c7dp | WordPress is vulnerable to SQL injection, information disclosure, and cross-site scripting attacks. |
CVE-2007-0109
|
| VCID-n2ep-cw4n-gkda | Cross-site scripting (XSS) vulnerability in wp-includes/general-template.php in WordPress before 20070309 allows remote attackers to inject arbitrary web script or HTML via the year parameter in the wp_title function. |
CVE-2007-1894
|
| VCID-n7ne-unru-7fhn | security update |
CVE-2020-28035
|
| VCID-ncux-8918-rygk | wordpress: SQL injection when certain DB charsets are used |
CVE-2007-6318
|
| VCID-ng4k-69hk-9ueu | security update |
CVE-2017-14990
|
| VCID-ngkc-cwzj-nbdk | security update |
CVE-2020-28033
|
| VCID-nj6g-ewk1-r7f1 | Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack. |
CVE-2016-4566
|
| VCID-nrq5-a7qq-mucd | Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.1 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) gallery shortcodes or (2) the content of a post. |
CVE-2013-0236
|
| VCID-ns2b-cr6m-t7gq | security update |
CVE-2015-5732
|
| VCID-ny68-2wje-q3df | security update |
CVE-2018-20153
|
| VCID-nztu-n4pg-p3be | Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622. |
CVE-2007-2627
|
| VCID-p1c8-hj6e-mkg4 | security update |
CVE-2014-5204
|
| VCID-p371-1hxy-eueh | WordPress fails to sufficiently check the format of cached username data. |
CVE-2006-2667
|
| VCID-p4r5-fz39-hkej | The XMLRPC API in WordPress before 3.5.1 allows remote attackers to send HTTP requests to intranet servers, and conduct port-scanning attacks, by specifying a crafted source URL for a pingback, related to a Server-Side Request Forgery (SSRF) issue. |
CVE-2013-0235
|
| VCID-pb81-1zfe-hqfb | security update |
CVE-2016-5834
|
| VCID-pc7x-gaqm-e7dj | Wordpress contains several cross-site scripting, cross-site request forgery and information leak vulnerabilities. |
CVE-2007-1230
|
| VCID-pd4w-3ttq-9yfs | security update |
CVE-2014-9035
|
| VCID-pgn4-7tt1-v7ct | wordpress: sql column truncation flaw |
CVE-2008-4106
|
| VCID-pkjb-8649-fqd2 | security update |
CVE-2020-28034
|
| VCID-psca-f78j-hbc2 | security update |
CVE-2020-28039
|
| VCID-pv2z-zrfb-83fy | Cross-site scripting (XSS) vulnerability in index.php in the Blue Memories theme 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, possibly a related issue to CVE-2007-2757 and CVE-2007-4014. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. |
CVE-2007-4165
|
| VCID-pwgx-qq3w-5baf | WordPress: Resource exhaustion (DoS) |
CVE-2009-3622
|
| VCID-pyzc-scrd-bufa | security update |
CVE-2020-11025
|
| VCID-pz3b-294m-nqfn | Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server. |
CVE-2018-10101
|
| VCID-q146-rfqv-1ych | security update |
CVE-2017-14719
|
| VCID-q527-42sm-x7fz | Unspecified vulnerability in wp-includes/js/swfobject.js in WordPress before 3.3.2 has unknown impact and attack vectors. |
CVE-2012-2400
|
| VCID-q84d-utmc-g3fn | security update |
CVE-2020-25286
|
| VCID-q9xz-t5cc-2uf7 | security update |
CVE-2015-5715
|
| VCID-qj5d-cu2t-efah | Open redirect vulnerability in wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the backto parameter. |
CVE-2008-6762
|
| VCID-qjdf-s39r-5bdb | PHP Spellchecker addon for TinyMCE allows attackers to trigger arbitrary outbound HTTP requests classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string. |
CVE-2012-6112
GHSA-fx5h-3786-h2w6 |
| VCID-qpsj-hsmm-6qa8 | security update |
CVE-2017-6816
|
| VCID-qpzg-tnaj-3uab | Cross-site scripting (XSS) vulnerability in wp-db-backup.php in WordPress 2.0.11 and earlier, and possibly 2.1.x through 2.3.x, allows remote attackers to inject arbitrary web script or HTML via the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. |
CVE-2008-0193
|
| VCID-qu9h-p3s6-8bd2 | security update |
CVE-2017-17093
|
| VCID-qwg1-c8b8-23gc | SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable. |
CVE-2003-1598
|
| VCID-qwk7-gv3y-97ck | several |
CVE-2013-2202
|
| VCID-r4qy-1wa6-t7gh | security update |
CVE-2019-17672
|
| VCID-r5u7-bft7-6bd3 | security update |
CVE-2017-8295
|
| VCID-rcvm-b2u5-43dc | Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896. |
CVE-2016-6897
|
| VCID-re92-3yew-1bft | security update |
CVE-2014-9037
|
| VCID-ruuu-vphs-5qap | security update |
CVE-2014-5240
|
| VCID-rz89-bchd-zqge | security update |
CVE-2014-9033
|
| VCID-s677-mr1w-q3he | WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php. |
CVE-2007-1277
|
| VCID-sany-su2d-73cn | wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. |
CVE-2017-5487
|
| VCID-sh9a-167m-57cw | security update |
CVE-2015-5622
|
| VCID-sj2p-hvgn-nbhe | wordpress: Malicious File Execution Vulnerability |
CVE-2008-2392
|
| VCID-sjz4-5jm5-nfdy | Wordpress contains several cross-site scripting, cross-site request forgery and information leak vulnerabilities. |
CVE-2007-1244
|
| VCID-snd3-cbgy-ybb2 | SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress before 2.2 allows remote attackers to execute arbitrary SQL commands via the cookie parameter. |
CVE-2007-2821
|
| VCID-srjh-2qnk-e7c6 | security update |
CVE-2017-6817
|
| VCID-sszr-mn9y-kkhg | WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. |
CVE-2022-4973
|
| VCID-swnk-8ave-bff2 | security update |
CVE-2018-20148
|
| VCID-sz3u-x51u-r3dn | Cross-site scripting (XSS) vulnerability in index.php in the WordPress Classic 1.5 theme in WordPress before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). |
CVE-2007-4483
|
| VCID-t4fg-hrp7-c7h9 | WordPress before 4.9.2 has XSS in the Flash fallback files in MediaElement (under wp-includes/js/mediaelement). |
CVE-2018-5776
|
| VCID-t4mw-4vck-d7ek | The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames. |
CVE-2011-3129
|
| VCID-tc97-uxfe-rqdc | security update |
CVE-2014-5205
|
| VCID-tcbf-ura1-mbfv | Cross-site scripting (XSS) vulnerability in the media-playlists feature in WordPress before 3.9.x before 3.9.3 and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2014-9032
|
| VCID-tekr-xkck-pkfu | Multiple vulnerabilities in Asterisk might allow remote attackers to cause a Denial of Service condition, or conduct other attacks. |
CVE-2008-7220
|
| VCID-tf2e-bgq5-9ff5 | security update |
CVE-2017-5611
|
| VCID-tf2u-dse2-mufb | security update |
CVE-2017-6814
|
| VCID-tffx-7mmd-gkcf | security update |
CVE-2020-28038
|
| VCID-tgfm-2c63-d7dk | security update |
CVE-2020-4049
|
| VCID-tr8v-5ee5-aqfp | The map_meta_cap function in wp-includes/capabilities.php in WordPress 3.4.x before 3.4.2, when the multisite feature is enabled, does not properly assign the unfiltered_html capability, which allows remote authenticated users to bypass intended access restrictions and conduct cross-site scripting (XSS) attacks by leveraging the Administrator or Editor role and composing crafted text. |
CVE-2012-3383
|
| VCID-trn4-a55k-sqad | security update |
CVE-2017-5490
|
| VCID-ttaw-fpb8-27hp | security update |
CVE-2016-2221
|
| VCID-tugh-42tp-8udr | Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 allows remote attackers to inject arbitrary web script or HTML via the user_login parameter. |
CVE-2007-5106
|
| VCID-u1fw-ahar-8uc1 | security update |
CVE-2020-4047
|
| VCID-u4ef-4sne-tbeg | security update |
CVE-2018-20147
|
| VCID-u93v-9mz6-cubm | wordpress: XML-RPC interface vulnerability |
CVE-2008-0664
|
| VCID-ufsd-zp75-u3h7 | wp-admin/press-this.php in WordPress before 3.0.6 does not enforce the publish_posts capability requirement, which allows remote authenticated users to perform publish actions by leveraging the Contributor role. |
CVE-2011-5270
|
| VCID-uja6-g5w2-1qd2 | several |
CVE-2013-2204
|
| VCID-ujms-xfg5-77e8 | Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool. |
CVE-2016-6896
|
| VCID-uwyj-2kgc-zyg6 | WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits. |
CVE-2023-22622
|
| VCID-uymd-e4m2-muem | wordpress: multiple vulnerabilities |
CVE-2009-2431
|
| VCID-uzm6-mwhv-xfbj | Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php. |
CVE-2006-4208
|
| VCID-v2xf-n28d-kfcx | security update |
CVE-2018-12895
|
| VCID-v5s7-vwe3-5bak | security update |
CVE-2020-11029
|
| VCID-v7ph-mtd1-y3e1 | security update |
CVE-2022-43500
|
| VCID-v8by-vn2q-r7gx | wp-admin/async-upload.php in the media uploader in WordPress before 3.0.5 allows remote authenticated users to read (1) draft posts or (2) private posts via a modified attachment_id parameter. |
CVE-2011-0701
|
| VCID-vchz-vuh2-cfd9 | Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF. |
CVE-2007-1622
|
| VCID-vg54-wjcw-fuh4 | security update |
CVE-2017-5610
|
| VCID-vhnc-k9yw-cuar | wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match. |
CVE-2010-5293
|
| VCID-vj6y-1qup-jubg | security update |
CVE-2017-5493
|
| VCID-vn8w-n4v7-kkfd | WordPress 2.0.11 and earlier allows remote attackers to obtain sensitive information via an empty value of the page parameter to certain PHP scripts under wp-admin/, which reveals the path in various error messages. |
CVE-2008-0195
|
| VCID-vr2c-p6jy-3bb9 | several |
CVE-2013-2205
|
| VCID-vs2q-hgzx-jkgk | Cross-site scripting (XSS) vulnerability in WordPress before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2011-4956
|
| VCID-vvb8-5w2s-euc2 | several |
CVE-2013-2201
|
| VCID-vyw2-2d41-6fhh | Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php. |
CVE-2004-1559
|
| VCID-vywc-p4tw-8yd2 | security update |
CVE-2017-6815
|
| VCID-w7r4-c8yh-hkbc | security update |
CVE-2017-9061
|
| VCID-w8w1-e5zu-ffgx | security update |
CVE-2020-11026
|
| VCID-wenb-bpws-mkar | security update |
CVE-2020-11028
|
| VCID-wsez-144m-hkd4 | Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 and 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the user_email parameter. |
CVE-2007-5105
|
| VCID-wtuc-n99m-fyby | xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post." |
CVE-2007-1893
|
| VCID-wzb1-au3p-uuas | Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543. |
CVE-2007-3544
|
| VCID-x5g3-2yvt-xkfm | security update |
CVE-2017-9062
|
| VCID-x733-wwnx-c7fv | WordPress version <4.9 contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time. This issue appears to have been partially, but not completely fixed in WordPress 4.9 |
CVE-2017-1000600
|
| VCID-x7aj-4qxd-rkcu | security update |
CVE-2017-14726
|
| VCID-x89y-av45-ufgh | security update |
CVE-2014-0165
|
| VCID-x8zt-cvau-xbeb | A flaw in WordPress allows registered WordPress users to elevate privileges. |
CVE-2006-4028
|
| VCID-xd4w-ak3v-dybq | security update |
CVE-2018-20151
|
| VCID-xezj-tz9b-t7d3 | WordPress contains HTTP response splitting and cross-site scripting vulnerabilities. |
CVE-2004-1584
|
| VCID-xfxs-pjex-3bh3 | security update |
CVE-2023-39999
|
| VCID-xg1e-yjwb-r3h4 | security update |
CVE-2015-5714
|
| VCID-xj9y-sb3e-vkac | WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. |
CVE-2007-0540
|
| VCID-xsz3-bme6-ubfn | WordPress: XSS via unescaped HTML URLs as author comments in the admin page |
CVE-2009-2851
|
| VCID-xwgs-bt6t-qfbh | security update |
CVE-2015-5623
|
| VCID-xzu6-fn31-43ej | security update |
CVE-2022-21662
|
| VCID-y1em-tppz-7qew | Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form. |
CVE-2010-4536
|
| VCID-y2jb-7zbk-27cg | Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function. |
CVE-2012-3414
|
| VCID-y72f-vtf2-2fat | wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array. |
CVE-2009-2762
|
| VCID-yees-gysw-d3cx | security update |
CVE-2016-5839
|
| VCID-ymp4-217x-6ub4 | wordpress: multiple vulnerabilities |
CVE-2009-2432
|
| VCID-yqyp-a879-nfda | WordPress is vulnerable to SQL injection, information disclosure, and cross-site scripting attacks. |
CVE-2007-0107
|
| VCID-ys9t-dsgg-zbff | Cross-site scripting (XSS) vulnerability in wp-admin/press-this.php in WordPress before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML via the s parameter (aka the selection variable). |
CVE-2009-3891
|
| VCID-ysde-2c1f-r3a3 | wp-includes/vars.php in Wordpress before 2.2.3 does not properly extract the current path from the PATH_INFO ($PHP_SELF), which allows remote attackers to bypass intended access restrictions for certain pages. |
CVE-2008-2146
|
| VCID-z4g5-m3kv-93e3 | security update |
CVE-2017-9063
|
| VCID-z8gv-sec9-xbam | security update |
CVE-2017-14722
|
| VCID-zebg-ku4f-dbgk | security update |
CVE-2015-3429
|
| VCID-zf8r-75us-nygf | WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any status. |
CVE-2026-3906
|
| VCID-zhsu-sye9-mkaz | security update |
CVE-2017-9064
|
| VCID-zj9a-shru-e7gs | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30. |
CVE-2025-58674
|
| VCID-zmhc-4gku-13ga | security update |
CVE-2020-28037
|
| VCID-znav-bux7-7qd2 | wp-admin/includes/class-wp-posts-list-table.php in WordPress before 3.3.3 does not properly restrict excerpt-view access, which allows remote authenticated users to obtain sensitive information by visiting a draft. |
CVE-2012-6635
|
| VCID-znb5-qcr5-pqaf | security update |
CVE-2018-20152
|
| VCID-ztfv-xfxe-kket | wordpress: multiple vulnerabilities |
CVE-2009-2335
|
| VCID-zvnm-b6n7-1kbx | wp-includes/taxonomy.php in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Taxonomy query hardening," possibly involving SQL injection. |
CVE-2011-3130
|
| VCID-zwpk-86cs-tqaz | Wordpress contains SQL injection and XSS vulnerabilities. |
CVE-2005-1810
|
| VCID-zyqs-75ad-8kcd | security update |
CVE-2016-7169
|
| VCID-zzcw-snrs-kygh | security update |
CVE-2015-5731
|