First published: Thu Jan 06 2022(Updated: )
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress WordPress | <5.8.3 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21663 is a vulnerability in WordPress that allows users with the Super Admin role to bypass explicit/additional hardening through object injection.
The severity of CVE-2022-21663 is high with a severity value of 7.2.
We do not encourage or provide information on exploiting vulnerabilities. It is important to prioritize the patching or updating of affected software.
To fix CVE-2022-21663, you should update your WordPress installation to version 5.8.3 or higher.
You can refer to the following resources for more information: <br> - WordPress Security Release: [Link](https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/) <br> - WordPress GitHub Security Advisories: [Link](https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h) <br> - HackerOne Report: [Link](https://hackerone.com/reports/541469)