Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, shortcode execution, information disclosure and Denial of Service via cache poisoning vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, to execute shortcodes by calling the built-in 'parse-media-shortcode' AJAX handler, to obtain sensitive information or to deny REST API endpoint access to legitimate users. WordPress versions 5.3.x ranging from 5.3 and up to (and including) 5.3.15 are vulnerable.
Remediation
Update to WordPress version 5.3.16 or latest
References
https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/
https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory
https://www.wordfence.com/blog/2023/10/wordpress-6-3-2-security-release-what-you-need-to-know/
https://wordpress.org/documentation/wordpress-version/version-5-3-16/
Related Vulnerabilities
PleskLin Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-0132)
WordPress Plugin JS Help Desk (formerly JS Support Ticket) SQL Injection (2.1.0)
Oracle JRE CVE-2019-2933 Vulnerability (CVE-2019-2933)
Ruby Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2011-1004)
WordPress Plugin WP Visitor Statistics (Real Time Traffic) Cross-Site Scripting (6.4)