Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Titlewordpress security update
NameDSA-4401First vendor Publication2019-03-01
VendorDebianLast vendor Modification2019-03-01
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and PHP injections attacks, delete files, leak potentially sensitive data, create posts of unauthorized types, or cause denial-of-service by application crash.

For the stable distribution (stretch), these problems have been fixed in version 4.7.5+dfsg-2+deb9u5.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wordpress

Original Source

Url : http://www.debian.org/security/2019/dsa-4401

CWE : Common Weakness Enumeration

38 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
12 %CWE-502Deserialization of Untrusted Data
12 %CWE-284Access Control (Authorization) Issues
12 %CWE-200Information Exposure
12 %CWE-94Failure to Control Generation of Code ('Code Injection')
12 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration


Alert History

If you want to see full details history, please login or register.
2019-03-01 09:18:46
  • First insertion