TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2022-21663

MEDIUM
6.6

Beschreibung

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

CVE Details

CVSS v3.1 Bewertung6.6
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht1/6/2022
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

debian:debian_linuxfedoraproject:fedorawordpress:wordpress

Schwachen (CWE)

CWE-74CWE-502

Referenzen

https://www.debian.org/security/2022/dsa-5039(security-advisories@github.com)
https://www.debian.org/security/2022/dsa-5039(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.