CVE-2017-1001000

HIGH EXPLOITED

WordPress 4.7.x <4.7.2 - RCE

Title source: llm

Description

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

Exploits (1)

metasploit WORKING POC
by Marc Montpas, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wordpress_content_injection.rb

Scores

CVSS v3 7.5
EPSS 0.8037
EPSS Percentile 99.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Exploitation Intel

VulnCheck KEV 2021-06-02

Classification

Status draft

Affected Products (3)

wordpress/wordpress
wordpress/wordpress
wordpress/wordpress

Timeline

Published Apr 03, 2017
Tracked Since Feb 18, 2026