First published: Thu Jan 06 2022(Updated: )
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to lack of proper sanitization in one of the classes, there's potential for unintended SQL queries to be executed. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 4.1.34. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | <5.8.3 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21664 is a vulnerability in WordPress that allows for unintended SQL queries to be executed due to a lack of proper sanitization in one of the classes.
The severity of CVE-2022-21664 is high with a CVSS score of 8.8.
WordPress versions 5.0.15+dfsg1-0+deb10u1, 5.0.19+dfsg1-0+deb10u1, 5.7.8+dfsg1-0+deb11u2, 6.1.1+dfsg1-1, and 6.3.1+dfsg1-1 are affected by CVE-2022-21664.
To fix CVE-2022-21664, you should update WordPress to version 5.8.3 or newer.
You can find more information about CVE-2022-21664 at the following references: [Link 1](https://github.com/WordPress/wordpress-develop/commit/c09ccfbc547d75b392dbccc1ef0b4442ccd3c957), [Link 2](https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jp3p-gw8h-6x86), [Link 3](https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html).