Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-1001000Wordpress vulnerability

7 documents7 sources
Severity
7.5HIGHNVD
EPSS
78.9%
top 0.94%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 3
Latest updateMay 13

Description

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/wordpress< wordpress 4.7.2+dfsg-1 (bookworm)
Debianwordpress/wordpress< 4.7.2+dfsg-1+3
NVDwordpress/wordpress4.7, 4.7.1, 4.7.2+2

🔴Vulnerability Details

3
GHSA
GHSA-qm68-r9p4-ghhx: The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller2022-05-13
OSV
CVE-2017-1001000: The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller2017-04-03
VulnCheck
WordPress REST API register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php Vulnerability2017

💥Exploits & PoCs

1
Metasploit
WordPress REST API Content Injection

📋Vendor Advisories

1
Debian
CVE-2017-1001000: wordpress - The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-pos...2017

🕵️Threat Intelligence

1
Tenable
Are Your Web Apps Protected Against Component Vulnerabilities?2019-03-21
CVE-2017-1001000 — Debian Wordpress vulnerability | cvebase