CVE-2021-29447 Information
Share on:Description
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1 along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Reference
https://wordpress.org/news/category/security/ https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-rv47-pc52-qrhh https://lists.debian.org/debian-lts-announce/2021/04/msg00017.html https://www.debian.org/security/2021/dsa-4896 http://packetstormsecurity.com/files/163148/XML-External-Entity-Via-MP3-File-Upload-On-WordPress.html http://packetstormsecurity.com/files/164198/WordPress-5.7-Media-Library-XML-Injection.html
Attack Complexity
LOW
Privileges Required
LOW
User Interaction Required
LOW
Scope
NONE
Confidentiality Impact
UNCHANGED
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
NONE
Base Severity
6.5