Vulnerability Description
The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 4.3.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2015/dsa-3375
- http://www.debian.org/security/2015/dsa-3383
- http://www.securityfocus.com/bid/76748
- http://www.securitytracker.com/id/1033979
- https://codex.wordpress.org/Version_4.3.1PatchVendor Advisory
- https://github.com/WordPress/WordPress/commit/9c57f3a4291f2311ae05f22c10eedeb0f6Patch
- https://security-tracker.debian.org/tracker/CVE-2015-5715
- https://wordpress.org/news/2015/09/wordpress-4-3-1/PatchVendor Advisory
- https://wpvulndb.com/vulnerabilities/8188
- http://www.debian.org/security/2015/dsa-3375
- http://www.debian.org/security/2015/dsa-3383
- http://www.securityfocus.com/bid/76748
- http://www.securitytracker.com/id/1033979
- https://codex.wordpress.org/Version_4.3.1PatchVendor Advisory
- https://github.com/WordPress/WordPress/commit/9c57f3a4291f2311ae05f22c10eedeb0f6Patch
FAQ
What is CVE-2015-5715?
CVE-2015-5715 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arran...
How severe is CVE-2015-5715?
CVE-2015-5715 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5715?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.