Description
Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Yorick Koster · textwebappsphp
https://www.exploit-db.com/exploits/40288
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/92572
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1036683
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/40288/
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/08/20/1
Vendor Advisory x_refsource_misc
https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html
Patch x_refsource_confirm
https://github.com/WordPress/WordPress/commit/8c82515ab62b88fb32d01c9778f0204b296f3568
Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/8606
Scores
CVSS v3
6.5
EPSS
0.3026
EPSS Percentile
96.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-352
Status
published
Products (1)
wordpress/wordpress
< 4.5.5
Published
Jan 18, 2017
Tracked Since
Feb 18, 2026