Search for vulnerabilities
| Vulnerability ID | VCID-q4xy-rtns-2yde |
| Aliases |
CVE-2014-5266
|
| Summary | security update |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 0.7 |
| Risk | 1.4 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| Data source | Metasploit |
|---|---|
| Description | Wordpress XMLRPC parsing is vulnerable to a XML based denial of service. This vulnerability affects Wordpress 3.5 - 3.9.2 (3.8.4 and 3.7.4 are also patched). |
| Note | Stability: - crash-service-down SideEffects: [] Reliability: [] |
| Ransomware campaign use | Unknown |
| Source publication date | Aug. 6, 2014 |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/http/wordpress_xmlrpc_dos.rb |
| Percentile | 0.98712 |
| EPSS Score | 0.72764 |
| Published At | July 30, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T09:52:03.889086+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 | 37.0.0 |