CVE-2017-1001000
HIGH EXPLOITEDWordPress 4.7.x <4.7.2 - RCE
Title source: llmDescription
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
Exploits (1)
metasploit
WORKING POC
by Marc Montpas, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wordpress_content_injection.rb
References (9)
Scores
CVSS v3
7.5
EPSS
0.8037
EPSS Percentile
99.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Exploitation Intel
VulnCheck KEV
2021-06-02
Classification
Status
draft
Affected Products (3)
wordpress/wordpress
wordpress/wordpress
wordpress/wordpress
Timeline
Published
Apr 03, 2017
Tracked Since
Feb 18, 2026