TROYANOSYVIRUS
Retour aux CVEs

CVE-2022-21663

MEDIUM
6.6

Description

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

Details CVE

Score CVSS v3.16.6
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisHIGH
Interaction utilisateurNONE
Publie1/6/2022
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

debian:debian_linuxfedoraproject:fedorawordpress:wordpress

Faiblesses (CWE)

CWE-74CWE-502

References

https://www.debian.org/security/2022/dsa-5039(security-advisories@github.com)
https://www.debian.org/security/2022/dsa-5039(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.