CVE-2017-8295

MEDIUM EXPLOITED

Wordpress < 4.7.4 - Password Reset Weakness

Title source: rule

Description

WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: (1) the attacker can prevent the victim from receiving any e-mail messages for an extended period of time (such as 5 days), (2) the victim's e-mail system sends an autoresponse containing the original message, or (3) the victim manually composes a reply containing the original message.

Exploits (6)

nomisec WORKING POC 20 stars
by cyberheartmi9 · remote
https://github.com/cyberheartmi9/CVE-2017-8295
nomisec WRITEUP 2 stars
by alash3al · poc
https://github.com/alash3al/wp-allowed-hosts
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2017-8295
nomisec WRITEUP
by homjxi0e · poc
https://github.com/homjxi0e/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2017-8295
exploitdb WORKING POC
by Dawid Golunski · textwebappslinux
https://www.exploit-db.com/exploits/41963

Scores

CVSS v3 5.9
EPSS 0.7710
EPSS Percentile 98.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Exploitation Intel

VulnCheck KEV 2022-01-26

Classification

CWE
CWE-640
Status draft

Affected Products (1)

wordpress/wordpress < 4.7.4

Timeline

Published May 04, 2017
Tracked Since Feb 18, 2026