Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-1001000 — Wordpress vulnerability
7 documents7 sources
Severity
7.5HIGHNVD
EPSS
78.9%
top 0.94%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 3
Latest updateMay 13
Description
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
🔴Vulnerability Details
3GHSA▶
GHSA-qm68-r9p4-ghhx: The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller↗2022-05-13
OSV▶
CVE-2017-1001000: The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller↗2017-04-03
VulnCheck▶
WordPress REST API register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php Vulnerability↗2017
💥Exploits & PoCs
1📋Vendor Advisories
1Debian▶
CVE-2017-1001000: wordpress - The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-pos...↗2017