icon

We found results for “

CVE-2017-6514

Good to know:

icon

Date: May 22, 2019

WordPress 4.7.2 mishandles listings of post authors, which allows remote attackers to obtain sensitive information (Path Disclosure) via a /wp-json/oembed/1.0/embed?url= request, related to the "author_name":" substring.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Exposure of Sensitive Information to an Unauthorized Actor

CWE-200

Top Fix

icon

Upgrade Version

Upgrade to version my-oos/my-oos - v2.0.89;composer-wordpress/full - 4.7.3;composer-wordpress/no-content - 4.7.3;mindgruve/wordpress - 4.7.3;jesseberkhof/wordpress-fork - 4.7.3;dotcra/wprdpress - 4.7.3;cyruscollier/wordpress-develop - 4.7.3;radialfunction/unicourt-blog - 4.7.3;wplib/wplib-box - 0.12.1;composer-wordpress/new-bundled - 4.7.3;kanopi/wordpress-core - 4.7.3;kinsta/kinsta-mu-plugins - 4.7.3;pantheon-systems/wordpress-composer - 4.7.3;roots/wordpress - 4.7.3;humanit-se/wordpress-sv - v4.7.3;medreleaf/wordpress - dev-4.8.2.1-dev

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): NONE
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us