SynopsisThe remote server is hosting an outdated installation of WordPress that is affected by multiple vulnerabilities.
DescriptionVersions of WordPress prior to 4.7.2 are affected by multiple vulnerabilities :
- A flaw exists in the 'wp-admin/includes/class-wp-press-this.php' script that is triggered as the user interface for assigning taxonomy terms is exposed to users, who do not have permission to use it. This may allow an authenticated, remote attacker to gain unauthorized acces to sensitive information.
- A flaw exists that may allow carrying out an SQL injection attack. The issue is due to the 'wp-includes/class-wp-query.php' script not properly sanitizing input to post type names before using it in SQL queries. This may potentially allow a remote attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
- A flaw exists that allows a cross-site scripting (XSS) attack. This flaw exists because the 'wp-admin/includes/class-wp-posts-list-table.php' script does not properly validated input to posts list table excerpts before returning it to users. This may allow a remote attacker to create a specially crafted request that will execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists in the '/wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php' script that is due to a failure to securely perform permission checks. This may allow a remote attacker to change the content of arbitrary posts or pages.
SolutionUpgrade to WordPress 4.7.2 or later.