First published: Tue Nov 25 2014(Updated: )
wp-login.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to reset passwords by leveraging access to an e-mail account that received a password-reset message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Mageia | =3 | |
Mageia | =4 | |
WordPress | <=3.7.4 | |
WordPress | =3.8 | |
WordPress | =3.8.1 | |
WordPress | =3.8.2 | |
WordPress | =3.8.3 | |
WordPress | =3.8.4 | |
WordPress | =3.9 | |
WordPress | =3.9.1 | |
WordPress | =3.9.2 | |
WordPress | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9039 has a medium severity rating, as it allows remote attackers to reset passwords if they gain access to the victim's email account.
To fix CVE-2014-9039, update your WordPress installation to version 4.0.1 or later.
CVE-2014-9039 affects WordPress versions prior to 3.7.5, all versions of 3.8.x before 3.8.5, all versions of 3.9.x before 3.9.3, and 4.x before 4.0.1.
Yes, CVE-2014-9039 can be exploited without user interaction by an attacker who has access to the victim's email.
CVE-2014-9039 is classified as an access control vulnerability that enables password reset attacks.