First published: Fri Jun 21 2013(Updated: )
wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =3.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2173 is rated as a medium severity vulnerability that can lead to denial of service.
CVE-2013-2173 affects WordPress 3.5.1 by allowing attackers to consume CPU resources through a malicious wp-postpass cookie.
Yes, CVE-2013-2173 specifically affects WordPress version 3.5.1.
Mitigation for CVE-2013-2173 can be achieved by upgrading to a patched version of WordPress that resolves this vulnerability.
If you are using WordPress 3.5.1, it is recommended to upgrade to a newer version to protect against CVE-2013-2173.