FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

wordpress -- multiple issues

Affected packages
wordpress < 4.8.2

Details

VuXML ID a48d4478-e23f-4085-8ae4-6b3a7b6f016b
Discovery 2017-09-23
Entry 2017-09-29

wordpress developers report:

Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

Before version 4.8.2, WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.

Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.

Before version 4.8.2, WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.

Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.

Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor.

References

CVE Name CVE-2017-14718
CVE Name CVE-2017-14719
CVE Name CVE-2017-14720
CVE Name CVE-2017-14721
CVE Name CVE-2017-14722
CVE Name CVE-2017-14724
CVE Name CVE-2017-14726
URL http://www.securityfocus.com/bid/100912
URL https://core.trac.wordpress.org/changeset/41393
URL https://core.trac.wordpress.org/changeset/41395
URL https://core.trac.wordpress.org/changeset/41397
URL https://core.trac.wordpress.org/changeset/41412
URL https://core.trac.wordpress.org/changeset/41448
URL https://core.trac.wordpress.org/changeset/41457
URL https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
URL https://wpvulndb.com/vulnerabilities/8911
URL https://wpvulndb.com/vulnerabilities/8912
URL https://wpvulndb.com/vulnerabilities/8913
URL https://wpvulndb.com/vulnerabilities/8914