Description
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/76748
Third Party Advisory x_refsource_confirm
https://security-tracker.debian.org/tracker/CVE-2015-5715
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3375
Patch, Vendor Advisory x_refsource_confirm
https://wordpress.org/news/2015/09/wordpress-4-3-1/
Patch x_refsource_confirm
https://github.com/WordPress/WordPress/commit/9c57f3a4291f2311ae05f22c10eedeb0f69337ab
Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/8188
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1033979
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3383
Patch, Vendor Advisory x_refsource_confirm
https://codex.wordpress.org/Version_4.3.1
Scores
CVSS v3
4.3
EPSS
0.2852
EPSS Percentile
96.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Details
CWE
CWE-264
Status
published
Products (1)
wordpress/wordpress
< 4.3.0
Published
May 22, 2016
Tracked Since
Feb 18, 2026