| Vulnerability Name: | CVE-2017-5612 (CCN-121543) | ||||||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2017-01-26 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2017-01-26 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-03-19 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Summary: | Cross-site scripting (XSS) vulnerability in wp-admin/includes/class-wp-posts-list-table.php in the posts list table in WordPress before 4.7.2 allows remote attackers to inject arbitrary web script or HTML via a crafted excerpt. | ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-79 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-5612 Source: CCN Type: SECTRACK ID: 1037731 WordPress Bugs Let Remote Users Conduct Cross-Site Scripting and SQL Injection Attacks, Obtain Potentially Sensitive Information, and Gain Elevated Privileges Source: DEBIAN Type: Third Party Advisory DSA-3779 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20170128 Re: CVE Request: Wordpress: 4.7.2 security release: unauthorized bypass, SQL injection, cross-site scripting issues Source: BID Type: Third Party Advisory, VDB Entry 95816 Source: CCN Type: BID-95816 WordPress Prior to 4.7.2 Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1037731 Source: CONFIRM Type: Release Notes https://codex.wordpress.org/Version_4.7.2 Source: XF Type: UNKNOWN wp-core-cve20175612-xss(121543) Source: CONFIRM Type: Issue Tracking, Patch https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849 Source: CCN Type: WordPress Web site WordPress 4.7.2 Security Release Source: CONFIRM Type: Patch, Vendor Advisory https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/ Source: MISC Type: Third Party Advisory https://wpvulndb.com/vulnerabilities/8731 Source: CCN Type: Rapid7 Web site WordPress REST API Content Injection Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-5612 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||||||