First published: Sat Sep 23 2017(Updated: )
Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14723 is classified as a high severity vulnerability due to its potential to allow SQL injection attacks.
To fix CVE-2017-14723, update WordPress to version 4.8.2 or later.
CVE-2017-14723 affects WordPress versions prior to 4.8.2.
Yes, CVE-2017-14723 can potentially be exploited by plugins that misuse the $wpdb->prepare function.
CVE-2017-14723 can facilitate SQL injection attacks, potentially compromising the database and exposing sensitive data.