WordPress Struck With Multiple Vulnerabilities In Variations Prior To 6.0.3

Posted by

WordPress published a security release to deal with multiple vulnerabilities found in variations of WordPress prior to 6.0.3. WordPress likewise updated all versions considering that WordPress 3.7.

Cross Site Scripting (XSS) Vulnerability

The U.S. Federal Government National Vulnerability Database published warnings of several vulnerabilities affecting WordPress.

There are several kinds of vulnerabilities impacting WordPress, consisting of a type called a Cross Website Scripting, often described as XSS.

A cross website scripting vulnerability generally emerges when a web application like WordPress does not effectively examine (sanitize) what is input into a type or submitted through an upload input.

An opponent can send a destructive script to a user who checks out the website which then performs the harmful script, thereupon providing sensitive information or cookies including user qualifications to the assaulter.

Another vulnerability discovered is called a Stored XSS, which is normally considered to be worse than a routine XSS attack.

With a saved XSS attack, the destructive script is kept on the site itself and is executed when a user or logged-in user checks out the website.

A third kind vulnerability discovered is called a Cross-Site Request Forgery (CSRF).

The non-profit Open Web Application Security Task (OWASP) security site describes this kind of vulnerability:

“Cross-Site Request Forgery (CSRF) is an attack that requires an end user to carry out unwanted actions on a web application in which they’re presently verified.

With a little aid of social engineering (such as sending a link via email or chat), an assaulter may deceive the users of a web application into carrying out actions of the assailant’s choosing.

If the victim is a normal user, an effective CSRF attack can force the user to carry out state altering demands like moving funds, changing their email address, etc.

If the victim is an administrative account, CSRF can jeopardize the entire web application.”

These are the vulnerabilities found:

  1. Kept XSS through wp-mail. php (post by e-mail)
  2. Open redirect in ‘wp_nonce_ays’
  3. Sender’s email address is exposed in wp-mail. php
  4. Media Library– Shown XSS by means of SQLi
  5. Cross-Site Demand Forgery (CSRF) in wp-trackback. php
  6. Kept XSS via the Customizer
  7. Revert shared user instances presented in 50790
  8. Stored XSS in WordPress Core through Remark Editing
  9. Information direct exposure through the REST Terms/Tags Endpoint
  10. Content from multipart e-mails leaked
  11. SQL Injection due to improper sanitization in ‘WP_Date_Query ‘RSS Widget: Stored XSS problem
  12. Stored XSS in the search block
  13. Feature Image Block: XSS problem
  14. RSS Block: Stored XSS concern
  15. Fix widget block XSS

Suggested Action

WordPress advised that all users upgrade their sites immediately.

The main WordPress statement stated:

“This release features several security repairs. Due to the fact that this is a security release, it is advised that you update your sites immediately.

All versions because WordPress 3.7 have likewise been updated.”

Check out the official WordPress announcement here:

WordPress 6.0.3 Security Release

Check Out the National Vulnerability Database entries for these vulnerabilities:




Included image by Best SMM Panel/Asier Romero