Description
WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1742-1 | wordpress security update |
Debian DSA |
DSA-4677-1 | wordpress security update |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:01:54.717Z
Reserved: 2019-03-14T00:00:00.000Z
Link: CVE-2019-9787
No data.
Status : Modified
Published: 2019-03-14T16:29:00.337
Modified: 2024-11-21T04:52:18.487
Link: CVE-2019-9787
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA