First published: Thu Dec 27 2012(Updated: )
WordPress 3.4.2 does not invalidate a wordpress_sec session cookie upon an administrator's logout action, which makes it easier for remote attackers to discover valid session identifiers via a brute-force attack, or modify data via a replay attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5868 is classified as a medium severity vulnerability that could allow unauthorized access to valid session identifiers.
To fix CVE-2012-5868, upgrade to a version of WordPress later than 3.4.2 that addresses this session management issue.
CVE-2012-5868 makes it possible for attackers to exploit session identifiers, which could lead to unauthorized data modification or access.
Only WordPress version 3.4.2 is specifically affected by CVE-2012-5868, as later versions include the necessary fixes.
CVE-2012-5868 can potentially allow brute-force attacks to discover session identifiers and replay attacks to manipulate data.