First published: Wed Jan 18 2017(Updated: )
The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=4.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10148 has a medium severity rating due to the potential for unauthorized access to sensitive plugin information.
To fix CVE-2016-10148, upgrade your WordPress installation to version 4.6 or higher.
Users of WordPress versions prior to 4.6 are affected by CVE-2016-10148.
CVE-2016-10148 is an authorization flaw that allows remote authenticated users to bypass read-access restrictions.
CVE-2016-10148 exploits a lack of permission checks in the wp_ajax_update_plugin function before calling get_plugin_data.