CVE Number – CVE-2019-9787
A vulnerability in WordPress could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
The vulnerability exists because the affected software has insufficient cross-site request forgery (CSRF) protection in the comment form and it incorrectly performs search engine optimization of Aelements. An attacker could exploit this vulnerability by posting a comment on a targeted WordPress site and including a link that submits malicious input to the site. If a site administrator accesses the malicious link, the attacker could conduct a cross-site scripting (XSS) attack and execute arbitrary code with administrative privileges. A successful exploit could result in a complete compromise of the affected site.Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.WordPress has confirmed the vulnerability and released software updates.
- To exploit this vulnerability, an attacker may use misleading language or instructions to persuade an administrator of a targeted site to access a link that submits malicious input to the site.
- Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to use an unprivileged account when browsing the Internet.
Administrators are advised to monitor critical systems.
Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.
Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.
- WordPress has released a security advisory at the following link: WordPress 5.1.1 Security and Maintenance Release
- WordPress has released a software update at the following link: WordPress 5.1.1