First published: Mon Jul 08 2013(Updated: )
WordPress before 3.5.2 allows remote attackers to read arbitrary files via an oEmbed XML provider response containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=3.5.1 | |
WordPress | =0.71 | |
WordPress | =1.0 | |
WordPress | =1.0.1 | |
WordPress | =1.0.2 | |
WordPress | =1.1.1 | |
WordPress | =1.2 | |
WordPress | =1.2.1 | |
WordPress | =1.2.2 | |
WordPress | =1.2.3 | |
WordPress | =1.2.4 | |
WordPress | =1.2.5 | |
WordPress | =1.2.5-a | |
WordPress | =1.3 | |
WordPress | =1.3.2 | |
WordPress | =1.3.3 | |
WordPress | =1.5 | |
WordPress | =1.5.1 | |
WordPress | =1.5.1.1 | |
WordPress | =1.5.1.2 | |
WordPress | =1.5.1.3 | |
WordPress | =1.5.2 | |
WordPress | =1.6.2 | |
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.2 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.0.8 | |
WordPress | =2.0.9 | |
WordPress | =2.0.10 | |
WordPress | =2.0.11 | |
WordPress | =2.1 | |
WordPress | =2.1.1 | |
WordPress | =2.1.2 | |
WordPress | =2.1.3 | |
WordPress | =2.2 | |
WordPress | =2.2.1 | |
WordPress | =2.2.2 | |
WordPress | =2.2.3 | |
WordPress | =2.3 | |
WordPress | =2.3.1 | |
WordPress | =2.3.2 | |
WordPress | =2.3.3 | |
WordPress | =2.5 | |
WordPress | =2.5.1 | |
WordPress | =2.6 | |
WordPress | =2.6.1 | |
WordPress | =2.6.2 | |
WordPress | =2.6.3 | |
WordPress | =2.6.5 | |
WordPress | =2.7 | |
WordPress | =2.7.1 | |
WordPress | =2.8 | |
WordPress | =2.8.1 | |
WordPress | =2.8.2 | |
WordPress | =2.8.3 | |
WordPress | =2.8.4 | |
WordPress | =2.8.4-a | |
WordPress | =2.8.5 | |
WordPress | =2.8.5.1 | |
WordPress | =2.8.5.2 | |
WordPress | =2.8.6 | |
WordPress | =2.9 | |
WordPress | =2.9.1 | |
WordPress | =2.9.1.1 | |
WordPress | =2.9.2 | |
WordPress | =3.3 | |
WordPress | =3.3.1 | |
WordPress | =3.3.2 | |
WordPress | =3.3.3 | |
WordPress | =3.4.0 | |
WordPress | =3.4.1 | |
WordPress | =3.4.2 | |
WordPress | =3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2202 has been rated as a moderate severity vulnerability due to its potential to allow remote attackers to read arbitrary files.
To fix CVE-2013-2202, you should upgrade your WordPress installation to version 3.5.2 or later.
CVE-2013-2202 affects all versions of WordPress prior to 3.5.2.
CVE-2013-2202 is classified as an XML External Entity (XXE) vulnerability.
Yes, CVE-2013-2202 can be exploited remotely by attackers to read arbitrary files on the server.