First published: Thu Apr 15 2021(Updated: )
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress WordPress | >=5.6.0<5.7.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29447 is a vulnerability in WordPress that allows a user with the ability to upload files to exploit an XML parsing issue in the Media Library, leading to XXE attacks.
CVE-2021-29447 has a severity level of 6.5, which is considered high.
A user with the ability to upload files, such as an Author, can exploit CVE-2021-29447 by uploading a malicious XML file in the Media Library.
WordPress versions 5.0.15+dfsg1-0+deb10u1, 5.0.19+dfsg1-0+deb10u1, 5.7.8+dfsg1-0+deb11u2, 6.1.1+dfsg1-1, and 6.3.1+dfsg1-1 are affected by CVE-2021-29447.
To fix CVE-2021-29447 in WordPress, it is recommended to update to a fixed version of the software provided by the vendor.