First published: Wed Jan 18 2017(Updated: )
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6896 has a medium severity level as it allows denial of service or unauthorized file read access.
To fix CVE-2016-6896, upgrade WordPress to version 4.5.4 or higher.
CVE-2016-6896 affects remote authenticated users using WordPress version 4.5.3.
CVE-2016-6896 allows an attacker to exploit directory traversal vulnerabilities to potentially read sensitive text files.
Yes, CVE-2016-6896 is a vulnerability in the WordPress core affecting the wp_ajax_update_plugin function.