Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, privilege escalation, security bypass, Denial of Service and PHP object injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to bypass the expected capabilities check, to perform otherwise restricted actions and subsequently delete arbitrary files, to deny service to legitimate users, or to possibly execute arbitrary PHP code within the context of the affected webserver process. WordPress versions 5.1.x ranging from 5.1 and up to (and including) 5.1.6 are vulnerable.
Remediation
Update to WordPress version 5.1.7 or latest
References
https://blog.sucuri.net/2020/10/reflected-xss-in-wordpress-v5-5-1-and-lower.html
https://blog.wpscan.com/2020/10/30/wordpress-5.5.2-security-release.html
https://threatpost.com/wordpress-patches-rce-bug/160812/
https://wordpress.org/support/wordpress-version/version-5-1-7/
Related Vulnerabilities
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-41079)
WordPress Plugin External 'Video for Everybody' Cross-Site Scripting (2.0)
WordPress Plugin WordPress Meta Data and Taxonomies Filter (MDTF) PHP Object Injection (1.2.2)
WordPress Plugin jRSS Widget Server-Side Request Forgery (1.2)
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2008-1318)