Description
In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/96602
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1037959
Patch, Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/8770
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://openwall.com/lists/oss-security/2017/03/06/7
Patch, Release Notes, Vendor Advisory x_refsource_misc
https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Patch, Vendor Advisory x_refsource_misc
https://codex.wordpress.org/Version_4.7.3
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
Exploit, Third Party Advisory x_refsource_misc
https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
Scores
CVSS v3
6.5
EPSS
0.1342
EPSS Percentile
94.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-352
Status
published
Products (1)
wordpress/wordpress
< 4.7.2
Published
Mar 12, 2017
Tracked Since
Feb 18, 2026