Published: 12/09/2013 Updated: 27/09/2013
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

The default configuration of WordPress prior to 3.6.1 does not prevent uploads of .swf and .exe files, which might make it easier for remote authenticated users to conduct cross-site scripting (XSS) attacks via a crafted file, related to the get_allowed_mime_types function in wp-includes/functions.php.

Affected Products

Vendor Product Versions

Vendor Advisories

Debian Bug report logs - #722537 wordpress: CVE-2013-4338 CVE-2013-4339 CVE-2013-4340 Package: wordpress; Maintainer for wordpress is Craig Small <csmall@debianorg>; Source for wordpress is src:wordpress (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 12 Sep 2013 05:30:02 UTC ...
Several vulnerabilities were identified in Wordpress, a web blogging tool As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the Wordpress package to the latest upstream version instead of backporting the patches This means extra care should be taken when upgrading, ...