Description
WordPress is prone to multiple vulnerabilities, including deserialization and PHP file upload vulnerabilities. Exploiting these issues could allow an attacker to call arbitrary PHP Objects that can be used to perform a variety of malicious actions, granted a POP chain is also present or to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. WordPress versions 5.6.x ranging from 5.6 and up to (and including) 5.6.12 are vulnerable.
Remediation
Update to WordPress version 5.6.13 or latest
References
Related Vulnerabilities
WordPress Plugin Woody ad snippets-Insert Header Footer Code, AdSense Ads Security Bypass (2.2.5)
WordPress Plugin WOOCS-Currency Switcher for WooCommerce Professional Cross-Site Scripting (1.1.5.1)
WordPress Plugin Mz-jajak 'id' Parameter SQL Injection (2.1)
WebLogic Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2020-7226)
WordPress Plugin WordPress Users 'uid' Parameter SQL Injection (1.3)