Lucene search

K
debianlists.debian.orgDEBIAN:DSA-5685-1:AE2F3
HistoryMay 08, 2024 - 10:06 p.m.

[SECURITY] [DSA 5685-1] wordpress security update

2024-05-0822:06:13
lists.debian.org
20
cve-2023-2745
wordpress
cve-2024-31210
bullseye
debian
cve-2023-38000
php file upload bypass
cve-2023-5561
cross-site-scripting
remote code execution
cve-2023-39999
bookworm
security update

AI Score

7.3

Confidence

Low

EPSS

0.004

Percentile

73.2%


Debian Security Advisory DSA-5685-1 [email protected]
https://www.debian.org/security/ Markus Koschany
May 08, 2024 https://www.debian.org/security/faq


Package : wordpress
CVE ID : CVE-2023-2745 CVE-2023-5561 CVE-2023-38000 CVE-2023-39999
CVE-2024-31210
Debian Bug : 1036296

Several security vulnerabilities have been discovered in Wordpress, a popular
content management framework, which may lead to exposure of sensitive
information to an unauthorized actor in WordPress or allowing unauthenticated
attackers to discern the email addresses of users who have published public
posts on an affected website via an Oracle style attack.

Furthermore this update resolves a possible cross-site-scripting vulnerability,
a PHP File Upload bypass via the plugin installer and a possible remote code
execution vulnerability which requires an attacker to control all the
properties of a deserialized object though.

For the oldstable distribution (bullseye), these problems have been fixed
in version 5.7.11+dfsg1-0+deb11u1.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.6+dfsg1-0+deb12u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]