CVE-2016-6896
HIGHWordPress Traversal Directory DoS
Title source: metasploitDescription
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Yorick Koster · textwebappsphp
https://www.exploit-db.com/exploits/40288
metasploit
WORKING POC
by Yorick Koster, CryptisStudents · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/wordpress_directory_traversal_dos.rb
References (5)
Scores
CVSS v3
7.1
EPSS
0.3518
EPSS Percentile
97.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Details
CWE
CWE-22
Status
published
Products (1)
wordpress/wordpress
4.5.3
Published
Jan 18, 2017
Tracked Since
Feb 18, 2026