Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-rcvm-b2u5-43dc
Vulnerability ID VCID-rcvm-b2u5-43dc
Aliases CVE-2016-6897
Summary Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.
Status Published
Exploitability 2.0
Weighted Severity 0.3
Risk 0.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Metasploit
Description Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.
Note
Stability:
  - crash-service-down
SideEffects: []
Reliability: []
Ransomware campaign use Unknown
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/http/wordpress_directory_traversal_dos.rb
Data source Exploit-DB
Date added Aug. 22, 2016
Description WordPress Core 4.5.3 - Directory Traversal / Denial of Service
Ransomware campaign use Known
Source publication date Aug. 22, 2016
Exploit type webapps
Platform php
Source update date Aug. 22, 2016
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.96649
EPSS Score 0.30259
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T16:32:08.737755+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.0.0