Fedora 37 : wordpress (2023-f238593a42)

high Nessus Plugin ID 176542

Language:

Synopsis

The remote Fedora host is missing one or more security updates.

Description

The remote Fedora 37 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2023-f238593a42 advisory.

**WordPress 6.2.2 Security Release**

Security updates included in this release:

* Block themes parsing shortcodes in user-generated data; thanks to Liam Gladdy of WP Engine for reporting this issue.

----

**WordPress 6.2.1 Maintenance & Security Release**

Security updates included in this release

* Block themes parsing shortcodes in user generated data; thanks to Liam Gladdy of WP Engine for reporting this issue
* A CSRF issue updating attachment thumbnails; reported by John Blackbourn of the WordPress security team
* A flaw allowing XSS via open embed auto discovery; reported independently by Jakub oczek of Securitum and during a third party security audit
* Bypassing of KSES sanitization in block attributes for low privileged users; discovered during a third party security audit.
* A path traversal issue via translation files; reported independently by Ramuel Gall and during a third party security audit.


Tenable has extracted the preceding description block directly from the Fedora security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected wordpress package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2023-f238593a42

Plugin Details

Severity: High

ID: 176542

File Name: fedora_2023-f238593a42.nasl

Version: 1.1

Type: local

Agent: unix

Published: 6/1/2023

Updated: 11/14/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:wordpress, cpe:/o:fedoraproject:fedora:37

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/23/2023

Vulnerability Publication Date: 5/23/2023

Reference Information