TROYANOSYVIRUS
Back to CVEs

CVE-2022-21663

MEDIUM
6.6

Description

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

CVE Details

CVSS v3.1 Score6.6
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredHIGH
User InteractionNONE
Published1/6/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

debian:debian_linuxfedoraproject:fedorawordpress:wordpress

Weaknesses (CWE)

CWE-74CWE-502

References

https://www.debian.org/security/2022/dsa-5039(security-advisories@github.com)
https://www.debian.org/security/2022/dsa-5039(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.