WordPress 5.8 < 5.8.1 / 5.7 < 5.7.3 / 5.6 < 5.6.5 / 5.5 < 5.5.6 / 5.4 < 5.4.7 / 5.2 < 5.2.12

high Nessus Plugin ID 153173

Synopsis

A PHP application running on the remote web server is affected by one or more vulnerabilities.

Description

WordPress versions 5.8 < 5.8.1 / 5.7 < 5.7.3 / 5.6 < 5.6.5 / 5.5 < 5.5.6 / 5.4 < 5.4.7 / 5.2 < 5.2.12 are affected by one or more vulnerabilities

Solution

Upgrade to WordPress version 5.8.1, 5.7.3, 5.6.5, 5.5.6, 5.4.7, 5.2.12 or later.

See Also

https://wordpress.org/download/releases/

http://www.nessus.org/u?8c25d82d

https://wordpress.org/support/wordpress-version/version-5-8-1/

Plugin Details

Severity: High

ID: 153173

File Name: wordpress_5_8_1.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 9/9/2021

Updated: 6/6/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2021-23337

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: www/PHP, installed_sw/WordPress, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/9/2021

Vulnerability Publication Date: 9/9/2021

Reference Information

CVE: CVE-2020-28500, CVE-2021-23337

IAVA: 2021-A-0410-S