Description
WordPress is prone to a Denial of Service vulnerability which can be exploited by malicious people to cause the affected website to consume memory and CPU resources, thus denying service to legitimate users. WordPress versions 4.6.x ranging from 4.6 and up to (and including) 4.6.10 are vulnerable.
Remediation
Evaluate and apply the suggested patch
References
https://baraktawily.blogspot.ro/2018/02/how-to-dos-29-of-world-wide-websites.html
https://www.youtube.com/watch?v=nNDsGTalXS0
https://github.com/Quitten/WordPress/blob/master/wp-dos-patch.sh
https://www.exploit-db.com/exploits/43968/
https://packetstormsecurity.com/files/146249/WordPress-Core-Denial-Of-Service.html
https://www.rastating.com/protecting-wordpress-against-cve-2018-6389/
Related Vulnerabilities
WordPress Plugin Multi Step Form Multiple Cross-Site Scripting Vulnerabilities (1.2.5)
WordPress Plugin Automattic Stats Referer Field HTML Injection (1.0)
Drupal Core 8.x.x Multiple Cross-Site Scripting Vulnerabilities (8.0.0 - 8.7.14)
WordPress Plugin Local Market Explorer 'api-key' Parameter Cross-Site Scripting (3.1.1)
WordPress Plugin Contact Form 7 Redirect & Thank You Page Cross-Site Request Forgery (1.0.3)