WordPress Vulnerabilities

Recently, new vulnerabilities affecting WordPress have been identified.

All customers who use WordPress are advised to upgrade to the latest version (3.5.2) immediately. You can view our full walk-through guide on Updating WordPress here in our Support Center.

Below is a list and explanation of the vulnerabilities:

  • CVE-2013-2173
    A denial of service was found in the way wordpress performs hash computation when checking password for protected posts. An attacker supplying carefully crafted input as a password could make the platform use excessive CPU usage
  • CVE-2013-2199
    Multiple server-side requests forgery (SSRF) vulnerabilities were found in the HTTP API. This is related to CVE-2013-0235, which was specific to SSRF in pingback requests and was fixed in 3.5.1
  • CVE-2013-2201
    Multiple cross-side scripting (XSS) vulnerabilities due to badly escaped input were found in the media files and plugins upload forms
  • CVE-2013-2202
    XML External Entity Injection (XXE) vulnerability via oEmbed responses
  • CVE-2013-2203
    A Full path disclosure (FPD) was found in the file upload mechanism. If the upload directory is not writable, the error message returned includes the full directory path
  • CVE-2013-2203
    A Full path disclosure (FPD) was found in the file upload mechanism. If the upload directory is not writable, the error message returned includes the full directory path
  • CVE-2013-2204
    Content spoofing via flash applet in the embedded tinyMCE media plugin
  • CVE-2013-2205
    Cross-domain XSS in the embedded SWFupload uploader

You can read the Official WordPress Release notes regarding this latest update on WordPress.org.

IC
InMotion Hosting Contributor Content Writer II

InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!

More Articles by InMotion Hosting

Was this article helpful? Join the conversation!

Questions about our MailChannels Deployment? We have answers and are here to help!Learn More
+