wordpress
Page content
- Author: voroskoi
- Vulnerable: 2.3.1-1sayshell1
- Unaffected: 2.3.2-1terminus1
Some vulnerabilities and a security issue have been reported in WordPress, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to bypass certain security restrictions and to disclose sensitive or system information.
- The application does not properly restrict access to posted drafts to users with valid administrator credentials. This can be exploited to read drafts by accessing the index.php script with data in the “PATH_INFO” URL part ending with “wp-admin/”.
- The XMLRPC function “metaWeblog.getRecentPosts” does not correctly verify that users have edit rights for a post before disclosing the “post_password”.
- A security issue is caused due to certain database error messages containing system information (e.g. table names).
- Bug Tracker URL: http://bugs.frugalware.org/task/2646
CVEs:
- There is no CVE entry for this issue.