WordPress < 2.3.3 XML-RPC Unauthenticated Post Modification

medium Nessus Network Monitor Plugin ID 4364

Synopsis

The remote host is vulnerable to a flaw that allows for unauthorized access to data.

Description

The version of WordPress installed on the remote host is vulnerable to an unauthorized access attack. An attacker exploiting this flaw would need the ability to authenticate as a valid user. Upon authentication, the user would be able to manipulate data sent to the 'xmlrpc.php' script which would allow for editing of other user posts.

Solution

Upgrade to WordPress 2.3.3, or later.

See Also

http://wordpress.org

Plugin Details

Severity: Medium

ID: 4364

Family: CGI

Published: 2/8/2008

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Reference Information

CVE: CVE-2008-0664

BID: 27669