First published: Mon Apr 03 2017(Updated: )
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =4.7 | |
WordPress | =4.7.1 | |
WordPress | =4.7.2 |
https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1001000 is considered a critical vulnerability as it allows remote attackers to modify arbitrary content on a WordPress site.
To fix CVE-2017-1001000, upgrade your WordPress installation to version 4.7.2 or later.
CVE-2017-1001000 affects WordPress versions 4.7, 4.7.1, and prior to 4.7.2.
CVE-2017-1001000 can enable content injection attacks where an attacker alters the content of WordPress posts.
Yes, there have been reports of exploits in the wild leveraging CVE-2017-1001000 to modify WordPress site content.