Description
Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1151-1 | wordpress security update |
Debian DLA |
DLA-1160-1 | wordpress security update |
Debian DSA |
DSA-3997-1 | wordpress security update |
EUVD |
EUVD-2017-6220 | Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T19:34:39.971Z
Reserved: 2017-09-23T00:00:00.000Z
Link: CVE-2017-14723
No data.
Status : Modified
Published: 2017-09-23T20:29:00.420
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-14723
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD