WordPress Struck With Several Vulnerabilities In Versions Prior To 6.0.3

Posted by

WordPress published a security release to deal with multiple vulnerabilities found in variations of WordPress prior to 6.0.3. WordPress likewise upgraded all versions because WordPress 3.7.

Cross Site Scripting (XSS) Vulnerability

The U.S. Government National Vulnerability Database published cautions of multiple vulnerabilities affecting WordPress.

There are multiple sort of vulnerabilities impacting WordPress, consisting of a type called a Cross Website Scripting, frequently described as XSS.

A cross site scripting vulnerability normally emerges when a web application like WordPress doesn’t properly inspect (sanitize) what is input into a kind or submitted through an upload input.

An enemy can send out a harmful script to a user who goes to the website which then performs the destructive script, thereupon offering delicate information or cookies containing user credentials to the opponent.

Another vulnerability discovered is called a Stored XSS, which is generally thought about to be even worse than a regular XSS attack.

With a kept XSS attack, the destructive script is saved on the website itself and is carried out when a user or logged-in user goes to the website.

A third kind vulnerability discovered is called a Cross-Site Request Forgery (CSRF).

The non-profit Open Web Application Security Job (OWASP) security website explains this kind of vulnerability:

“Cross-Site Demand Forgery (CSRF) is an attack that forces an end user to perform undesirable actions on a web application in which they’re currently confirmed.

With a little help of social engineering (such as sending a link by means of email or chat), an assaulter may fool the users of a web application into performing actions of the aggressor’s picking.

If the victim is a typical user, an effective CSRF attack can require the user to carry out state altering demands like transferring funds, altering their e-mail address, and so forth.

If the victim is an administrative account, CSRF can jeopardize the whole web application.”

These are the vulnerabilities discovered:

  1. Stored XSS through wp-mail. php (post by e-mail)
  2. Open reroute in ‘wp_nonce_ays’
  3. Sender’s email address is exposed in wp-mail. php
  4. Media Library– Reflected XSS by means of SQLi
  5. Cross-Site Request Forgery (CSRF) in wp-trackback. php
  6. Saved XSS via the Customizer
  7. Go back shared user instances introduced in 50790
  8. Saved XSS in WordPress Core by means of Comment Modifying
  9. Data exposure via the REST Terms/Tags Endpoint
  10. Content from multipart emails leaked
  11. SQL Injection due to incorrect sanitization in ‘WP_Date_Query ‘RSS Widget: Saved XSS concern
  12. Stored XSS in the search block
  13. Function Image Block: XSS concern
  14. RSS Block: Stored XSS problem
  15. Repair widget block XSS

Recommended Action

WordPress recommended that all users update their websites right away.

The official WordPress statement specified:

“This release includes a number of security fixes. Because this is a security release, it is advised that you upgrade your websites right away.

All versions because WordPress 3.7 have likewise been upgraded.”

Check out the official WordPress statement here:

WordPress 6.0.3 Security Release

Read the National Vulnerability Database entries for these vulnerabilities:




Included image by Best SMM Panel/Asier Romero