Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Six Flaws Patched With Release of WordPress 4.7.3

WordPress developers announced on Monday the availability of version 4.7.3, a security release that includes patches for six vulnerabilities and 39 maintenance fixes.

WordPress developers announced on Monday the availability of version 4.7.3, a security release that includes patches for six vulnerabilities and 39 maintenance fixes.

WordPress 4.7.3 addresses three cross-site scripting (XSS) flaws that can be exploited via media file metadata, video URLs in YouTube embeds, and taxonomy term names. Chris Andrè Dale, Yorick Koster, Simon P. Briggs, Sucuri researcher Marc Montpas, and a user with the moniker “Delta” have been credited for finding these security holes.

The latest WordPress update also fixes a vulnerability that allows control characters to trick redirect URL validation (reported by Daniel Chatfield), and a bug that can lead to administrators deleting unintended files via the plugin deletion functionality (reported by xuliang).

Another vulnerability patched on Monday, identified by Sipke Mellema, is a cross-site request forgery (CSRF) in the “Press This” function. Exploitation of this flaw can lead to excessive use of server resources and a denial-of-service (DoS) condition.

Mellema and Koster identified the CSRF and XSS vulnerabilities in July 2016 as part of the Summer of Pwnage competition organized by Dutch security firm Securify. The details of the security holes and proof-of-concept (PoC) code have been made public on the Summer of Pwnage website.

According to Koster, he identified two XSS flaws in WordPress’ playlist functionality. An attacker needs to convince an editor or administrator into uploading an MP3 file containing specially crafted metadata. The attacker’s code will get executed when the metadata is processed by the renderTracks() or wp_playlist_shortcode() methods.

Over 100 vulnerabilities have been found in the WordPress core and plugins as part of the Summer of Pwnage project, and most of the issues have been disclosed on March 1, regardless of whether or not they have been fixed.

One WordPress core vulnerability that still has not been patched is a CSRF found by Koster in July 2016. The details of the flaw have not been disclosed, but Cengiz Han Sahin, co-founder of Securify, told SecurityWeek that the unpatched flaw could, in theory, allow an attacker to steal FTP and SSH login credentials. The expert said the vulnerability can have a high impact, but the probability of exploitation is low.

While the developers of the content management system (CMS) claim WordPress 4.7.3 patches six vulnerabilities, there could be other issues they have not disclosed in an effort to protect users. When WordPress 4.7.2 was released on January 26, it appeared to patch only three vulnerabilities, but in reality it also resolved a critical privilege escalation and content injection issue that was disclosed only one week later.

This critical flaw has been exploited in defacements carried out by script kiddies and attacks whose goal was to gain full control of a website.

Related: WordPress Plugin With 1 Million Installs Has Critical Flaw

Related: Eight Vulnerabilities Patched in WordPress

Related: Over 8,800 WordPress Plugins Have Flaws

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Vulnerabilities

GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet