CVE-2019-17675
moderate-risk
Published 2019-10-17
WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
Do I need to act?
-
0.92% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (4)
References (18)
Third Party Advisory
https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-secu...
Mailing List
https://seclists.org/bugtraq/2020/Jan/8
Release Notes
https://wpvulndb.com/vulnerabilities/9913
Third Party Advisory
https://www.debian.org/security/2020/dsa-4599
Third Party Advisory
https://www.debian.org/security/2020/dsa-4677
Third Party Advisory
https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-secu...
Mailing List
https://seclists.org/bugtraq/2020/Jan/8
Release Notes
https://wpvulndb.com/vulnerabilities/9913
Third Party Advisory
https://www.debian.org/security/2020/dsa-4599
Third Party Advisory
https://www.debian.org/security/2020/dsa-4677
43
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
10/34 · Low