SB2023101634 - Fedora EPEL 7 update for wordpress
Published: October 16, 2023 Updated: May 13, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Stored cross-site scripting (CVE-ID: CVE-2023-38000)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the post link navigation block. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
2) Improper access control (CVE-ID: CVE-2023-39999)
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and read comments on private and password protected posts.
3) Information disclosure (CVE-ID: CVE-2023-5561)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the "/wp-json/wp/v2/users" REST API endpoin. A remote attacker can disclose email addresses of WordPress users by probing them character by character.
4) Cross-site scripting (CVE-ID: N/A)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via success_url and reject_url parameters in the application password screen. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Code Injection (CVE-ID: N/A)
The vulnerability allows a remote user to execute arbitrary shortcodes.
The vulnerability exists due to improper input validation. A remote user can bypass implemented security restrictions and execute arbitrary shortcodes on the website.
Remediation
Install update from vendor's website.