4
CVSSv2

CVE-2021-29447

Published: 15/04/2021 Updated: 23/04/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote malicious users to perform XML External Entity (XXE) attacks, and access private content. For the stable distribution (buster), these problems have been fixed in version 5.0.12+dfsg1-0+deb10u1. We recommend that you upgrade your wordpress packages. For the detailed security status of wordpress please refer to its security tracker page at: security-tracker.debian.org/tracker/wordpress

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

Vendor Advisories

Debian Bug report logs - #987065 wordpress: CVE-2021-29450: Authenticated disclosure of password-protected posts and pages Package: src:wordpress; Maintainer for src:wordpress is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 16 Apr 2021 20:51:01 UTC Severity: grave ...
Several vulnerabilities were discovered in Wordpress, a web blogging tool They allowed remote attackers to perform XML External Entity (XXE) attacks, and access private content For the stable distribution (buster), these problems have been fixed in version 5012+dfsg1-0+deb10u1 We recommend that you upgrade your wordpress packages For the deta ...
A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XML external entity injection (XXE) attacks This requires the WordPress installation to be using PHP 8 Access to internal files is possible in a successful XXE attack This has been patched in WordPress version 571, along wi ...