WordPress < 3.0.1 Privilege Escalation Vulnerability

low Nessus Network Monitor Plugin ID 9111

Synopsis

The remote server is hosting an outdated installation of WordPress that is vulnerable to a privilege escalation attack.

Description

Versions of WordPress prior to 3.0.1 are susceptible to a flaw when multisite installations are used that is due to the program retaining the 'site administrators can add users' option when it was changed. This may allow a remote authenticated attacker to add a user after a change to that setting and bypass intended access restrictions.

Solution

Upgrade to WordPress 3.0.1, or later.

See Also

http://codex.wordpress.org/Changelog/3.0.1

https://core.trac.wordpress.org/ticket/14119

Plugin Details

Severity: Low

ID: 9111

Family: CGI

Published: 2/26/2016

Updated: 3/6/2019

Nessus ID: 72960

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.5

Temporal Score: 3.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Patch Publication Date: 6/27/2010

Vulnerability Publication Date: 6/27/2010

Reference Information

CVE: CVE-2010-5297

BID: 65234