WordPress Hit With Numerous Vulnerabilities In Variations Prior To 6.0.3

Posted by

WordPress released a security release to attend to numerous vulnerabilities found in variations of WordPress prior to 6.0.3. WordPress likewise updated all variations since WordPress 3.7.

Cross Site Scripting (XSS) Vulnerability

The U.S. Federal Government National Vulnerability Database released cautions of several vulnerabilities impacting WordPress.

There are multiple kinds of vulnerabilities impacting WordPress, consisting of a type called a Cross Website Scripting, typically referred to as XSS.

A cross site scripting vulnerability normally develops when a web application like WordPress does not properly check (sterilize) what is input into a kind or uploaded through an upload input.

An opponent can send out a malicious script to a user who visits the website which then executes the destructive script, thereupon offering sensitive details or cookies including user credentials to the opponent.

Another vulnerability found is called a Stored XSS, which is generally thought about to be even worse than a routine XSS attack.

With a stored XSS attack, the malicious script is saved on the site itself and is executed when a user or logged-in user checks out the website.

A third kind vulnerability found is called a Cross-Site Demand Forgery (CSRF).

The non-profit Open Web Application Security Project (OWASP) security website describes this type of vulnerability:

“Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently validated.

With a little assistance of social engineering (such as sending out a link by means of e-mail or chat), an assailant might fool the users of a web application into executing actions of the aggressor’s picking.

If the victim is a normal user, an effective CSRF attack can force the user to carry out state altering demands like moving funds, altering their e-mail address, and so forth.

If the victim is an administrative account, CSRF can jeopardize the entire web application.”

These are the vulnerabilities discovered:

  1. Saved XSS by means of wp-mail. php (post by e-mail)
  2. Open redirect in ‘wp_nonce_ays’
  3. Sender’s e-mail address is exposed in wp-mail. php
  4. Media Library– Reflected XSS through SQLi
  5. Cross-Site Demand Forgery (CSRF) in wp-trackback. php
  6. Saved XSS through the Customizer
  7. Go back shared user circumstances introduced in 50790
  8. Saved XSS in WordPress Core by means of Comment Modifying
  9. Data exposure through the REST Terms/Tags Endpoint
  10. Content from multipart emails dripped
  11. SQL Injection due to inappropriate sanitization in ‘WP_Date_Query ‘RSS Widget: Stored XSS problem
  12. Kept XSS in the search block
  13. Feature Image Block: XSS issue
  14. RSS Block: Kept XSS problem
  15. Repair widget block XSS

Advised Action

WordPress suggested that all users upgrade their websites immediately.

The official WordPress statement specified:

“This release features several security repairs. Due to the fact that this is a security release, it is advised that you upgrade your sites immediately.

All versions considering that WordPress 3.7 have actually also been updated.”

Check out the main WordPress announcement here:

WordPress 6.0.3 Security Release

Check Out the National Vulnerability Database entries for these vulnerabilities:

CVE-2022-43504

CVE-2022-43500

CVE-2022-43497

Featured image by Best SMM Panel/Asier Romero