Description
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
Exploits (24)
nomisec
WORKING POC
3 stars
by elf1337 · poc
https://github.com/elf1337/blind-xxe-controller-CVE-2021-29447
nomisec
WORKING POC
2 stars
by Tea-On · poc
https://github.com/Tea-On/CVE-2021-29447-Authenticated-XXE-WordPress-5.6-5.7
nomisec
WRITEUP
2 stars
by Abdulazizalsewedy · poc
https://github.com/Abdulazizalsewedy/CVE-2021-29447
nomisec
WRITEUP
1 stars
by ArtemCyberLab · poc
https://github.com/ArtemCyberLab/Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets-
nomisec
WORKING POC
1 stars
by b-abderrahmane · poc
https://github.com/b-abderrahmane/CVE-2021-29447-POC
nomisec
WORKING POC
by specializzazione-cyber-security · poc
https://github.com/specializzazione-cyber-security/demo-CVE-2021-29447-lezione
References (7)
Scores
CVSS v3
7.1
EPSS
0.9050
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Lab Environment
COMMUNITY
Community Lab
+20 more repos
Details
CWE
CWE-611
Status
published
Products (3)
debian/debian_linux
9.0
debian/debian_linux
10.0
wordpress/wordpress
5.6.0 - 5.7.1
Published
Apr 15, 2021
Tracked Since
Feb 18, 2026