First published: Wed Jan 18 2017(Updated: )
Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=4.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6897 has a medium severity rating due to the potential for cross-site request forgery attacks.
To fix CVE-2016-6897, upgrade to WordPress version 4.6 or later.
CVE-2016-6897 affects all versions of WordPress prior to 4.6, especially impacting sites with subscriber-level users.
CVE-2016-6897 can enable remote attackers to hijack the authentication of subscribers via CSRF.
Yes, CVE-2016-6897 can be exploited by an attacker without needing user interaction, making it a serious risk.