First published: Fri Sep 14 2012(Updated: )
The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=3.4.1 | |
WordPress | =0.71 | |
WordPress | =1.0 | |
WordPress | =1.0.1 | |
WordPress | =1.0.2 | |
WordPress | =1.1.1 | |
WordPress | =1.2 | |
WordPress | =1.2.1 | |
WordPress | =1.2.2 | |
WordPress | =1.2.3 | |
WordPress | =1.2.4 | |
WordPress | =1.2.5 | |
WordPress | =1.2.5-a | |
WordPress | =1.3 | |
WordPress | =1.3.2 | |
WordPress | =1.3.3 | |
WordPress | =1.5 | |
WordPress | =1.5.1 | |
WordPress | =1.5.1.1 | |
WordPress | =1.5.1.2 | |
WordPress | =1.5.1.3 | |
WordPress | =1.5.2 | |
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.2 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.0.8 | |
WordPress | =2.0.9 | |
WordPress | =2.0.10 | |
WordPress | =2.0.11 | |
WordPress | =2.1 | |
WordPress | =2.1.1 | |
WordPress | =2.1.2 | |
WordPress | =2.1.3 | |
WordPress | =2.2 | |
WordPress | =2.2.1 | |
WordPress | =2.2.2 | |
WordPress | =2.2.3 | |
WordPress | =2.3 | |
WordPress | =2.3.1 | |
WordPress | =2.3.2 | |
WordPress | =2.3.3 | |
WordPress | =2.5 | |
WordPress | =2.5.1 | |
WordPress | =2.6 | |
WordPress | =2.6.1 | |
WordPress | =2.6.2 | |
WordPress | =2.6.3 | |
WordPress | =2.6.5 | |
WordPress | =2.7 | |
WordPress | =2.7.1 | |
WordPress | =2.8 | |
WordPress | =2.8.1 | |
WordPress | =2.8.2 | |
WordPress | =2.8.3 | |
WordPress | =2.8.4 | |
WordPress | =2.8.4-a | |
WordPress | =2.8.5 | |
WordPress | =2.8.5.1 | |
WordPress | =2.8.5.2 | |
WordPress | =2.8.6 | |
WordPress | =2.9 | |
WordPress | =2.9.1 | |
WordPress | =2.9.1.1 | |
WordPress | =2.9.2 | |
WordPress | =3.0 | |
WordPress | =3.0.1 | |
WordPress | =3.0.2 | |
WordPress | =3.0.3 | |
WordPress | =3.0.4 | |
WordPress | =3.0.5 | |
WordPress | =3.0.6 | |
WordPress | =3.1 | |
WordPress | =3.1.1 | |
WordPress | =3.1.2 | |
WordPress | =3.1.3 | |
WordPress | =3.1.4 | |
WordPress | =3.2 | |
WordPress | =3.2.1 | |
WordPress | =3.3 | |
WordPress | =3.3.1 | |
WordPress | =3.3.2 | |
WordPress | =3.3.3 | |
WordPress | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-4421 is considered high due to its potential for privilege escalation.
To fix CVE-2012-4421, upgrade to WordPress version 3.4.2 or later.
CVE-2012-4421 affects WordPress versions prior to 3.4.2, as well as several earlier versions.
CVE-2012-4421 can allow remote authenticated users to bypass access restrictions and publish posts.
Users with the Contributor role in WordPress installations prior to version 3.4.2 are most at risk.