Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, security bypass, or server-side request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, to bypass certain security restrictions and perform unauthorized actions, or to make the vulnerable server perform port scanning of hosts in internal or external networks. WordPress versions 4.7.x ranging from 4.7 and up to (and including) 4.7.14 are vulnerable.
Remediation
Update to WordPress version 4.7.15 or latest
References
https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/
https://blog.ripstech.com/2020/wordpress-hardening-bypass/
https://wordpress.org/support/wordpress-version/version-4-7-15/
Related Vulnerabilities
Claroline Other Vulnerability (CVE-2005-1375)
TYPO3 Improper Input Validation Vulnerability (CVE-2010-3667)
WordPress Plugin MasterStudy LMS-for Online Courses and Education Local File Inclusion (3.3.0)
WordPress Cross-Site Scripting Vulnerability (3.0 - 3.6.1)
MyBB Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-9411)