CVSS Summary
Score | 4.3 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | None |
Integrity | Partial |
Availability | None |
Last revised:
When posting comments,WordPress does not require a nonce value (unless posting unfiltered HTML). This means that an attacker can force a logged-in user to post arbitrary comments.
For this to happen, the logged-in user would have to be tricked into clicking on a link controlled by the attacker. It is easy to make these links very convincing.
The line which verifies the nonce when using unfiltered HTML is line 154 of wp-comments-post.php.
EDIT: this issue has been known about since 2009, but it appears that no fix is planned https://core.trac.wordpress.org/ticket/10931
Current state: Reported
Score | 4.3 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | None |
Integrity | Partial |
Availability | None |
Log in, visit an URL containing the following (replacing localhost as appropriate, replacing 1 with the ID of a post), click submit:
<form method="POST" action="http://localhost/wp-comments-post.php"> <input type="text" name="comment_post_ID" value="1"> <input type="text" name="comment" value="UH OH"> <input type="submit"> </form>
(In a real attack the form can be made to auto-submit using Javascript)
Disable comments until a new version is released that fixes this bug