First published: Thu May 18 2017(Updated: )
In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | <=4.7.4 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9066 is classified as a moderate severity vulnerability due to its potential for Server-Side Request Forgery (SSRF).
To fix CVE-2017-9066, upgrade your WordPress installation to version 4.7.5 or later.
CVE-2017-9066 affects all WordPress versions prior to 4.7.5.
CVE-2017-9066 is a Server-Side Request Forgery (SSRF) vulnerability caused by insufficient redirect validation.
CVE-2017-9066 impacts WordPress installations on Debian Linux versions 8.0 and 9.0.