Several vulnerabilities were discovered in wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following issues.
- CVE-2016-5387
WordPress allows remote attackers to bypass intended
access restrictions and remove a category attribute from a post via
unspecified vectors.
- CVE-2016-5832
The customizer in WordPress allows remote attackers to
bypass intended redirection restrictions via unspecified vectors.
- CVE-2016-5834
Cross-site scripting (XSS) vulnerability in the
wp_get_attachment_link function in wp-includes/post
template.php in WordPress allows remote
attackers to inject arbitrary web script or HTML via a crafted
attachment name.
- CVE-2016-5835
WordPress allows remote attackers to obtain sensitive
revision-history information by leveraging the ability to read a
post related to wp-admin/includes/ajax-actions.php and
wp-admin/revision.php.
- CVE-2016-5838
WordPress allows remote attackers to bypass intended password
change restrictions by leveraging knowledge of a cookie.
- CVE-2016-5839
WordPress allows remote attackers to bypass the
sanitize_file_name protection mechanism via unspecified vectors.
For Debian 7 Wheezy, these problems have been fixed in version
3.6.1+dfsg-1~deb7u11.
We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS>